Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
10-06-2024 15:35
Static task
static1
Behavioral task
behavioral1
Sample
adb64db04eef2da9ab7a4d866383f31564eaaa95206aa2a5e9b28ff8218750a0.exe
Resource
win10v2004-20240508-en
General
-
Target
adb64db04eef2da9ab7a4d866383f31564eaaa95206aa2a5e9b28ff8218750a0.exe
-
Size
392KB
-
MD5
a8d14c2aee72601b0187a8b03a2c5a70
-
SHA1
44ba442c8235953d224a8b4e95aef84d190d83c1
-
SHA256
adb64db04eef2da9ab7a4d866383f31564eaaa95206aa2a5e9b28ff8218750a0
-
SHA512
3e6b6779544c41f260f7f281960e58dd992b3c2294d868ca2620c0078a3a78e0e3e04d26b77116aae92bffa68c0d352fcd3a8fac838e558aaf8f6649adfb78b1
-
SSDEEP
6144:BYavswvPY5L/Lwe0/laYz5bVu9tkpr+Zls54Mh19lzDeTfFb4T:PswvPuxkMqVu3le5Z1zDeT6
Malware Config
Extracted
gcleaner
185.172.128.90
5.42.64.56
185.172.128.69
Signatures
-
Downloads MZ/PE file
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 11 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3248 3564 WerFault.exe adb64db04eef2da9ab7a4d866383f31564eaaa95206aa2a5e9b28ff8218750a0.exe 3088 3564 WerFault.exe adb64db04eef2da9ab7a4d866383f31564eaaa95206aa2a5e9b28ff8218750a0.exe 3344 3564 WerFault.exe adb64db04eef2da9ab7a4d866383f31564eaaa95206aa2a5e9b28ff8218750a0.exe 3632 3564 WerFault.exe adb64db04eef2da9ab7a4d866383f31564eaaa95206aa2a5e9b28ff8218750a0.exe 5016 3564 WerFault.exe adb64db04eef2da9ab7a4d866383f31564eaaa95206aa2a5e9b28ff8218750a0.exe 4984 3564 WerFault.exe adb64db04eef2da9ab7a4d866383f31564eaaa95206aa2a5e9b28ff8218750a0.exe 4068 3564 WerFault.exe adb64db04eef2da9ab7a4d866383f31564eaaa95206aa2a5e9b28ff8218750a0.exe 4668 3564 WerFault.exe adb64db04eef2da9ab7a4d866383f31564eaaa95206aa2a5e9b28ff8218750a0.exe 4588 3564 WerFault.exe adb64db04eef2da9ab7a4d866383f31564eaaa95206aa2a5e9b28ff8218750a0.exe 3408 3564 WerFault.exe adb64db04eef2da9ab7a4d866383f31564eaaa95206aa2a5e9b28ff8218750a0.exe 3084 3564 WerFault.exe adb64db04eef2da9ab7a4d866383f31564eaaa95206aa2a5e9b28ff8218750a0.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 2240 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 2240 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
adb64db04eef2da9ab7a4d866383f31564eaaa95206aa2a5e9b28ff8218750a0.execmd.exedescription pid process target process PID 3564 wrote to memory of 560 3564 adb64db04eef2da9ab7a4d866383f31564eaaa95206aa2a5e9b28ff8218750a0.exe cmd.exe PID 3564 wrote to memory of 560 3564 adb64db04eef2da9ab7a4d866383f31564eaaa95206aa2a5e9b28ff8218750a0.exe cmd.exe PID 3564 wrote to memory of 560 3564 adb64db04eef2da9ab7a4d866383f31564eaaa95206aa2a5e9b28ff8218750a0.exe cmd.exe PID 560 wrote to memory of 2240 560 cmd.exe taskkill.exe PID 560 wrote to memory of 2240 560 cmd.exe taskkill.exe PID 560 wrote to memory of 2240 560 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\adb64db04eef2da9ab7a4d866383f31564eaaa95206aa2a5e9b28ff8218750a0.exe"C:\Users\Admin\AppData\Local\Temp\adb64db04eef2da9ab7a4d866383f31564eaaa95206aa2a5e9b28ff8218750a0.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 4762⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 5322⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 7802⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 7802⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 8122⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 8722⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 9842⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 9922⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 12402⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 17802⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "adb64db04eef2da9ab7a4d866383f31564eaaa95206aa2a5e9b28ff8218750a0.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\adb64db04eef2da9ab7a4d866383f31564eaaa95206aa2a5e9b28ff8218750a0.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "adb64db04eef2da9ab7a4d866383f31564eaaa95206aa2a5e9b28ff8218750a0.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 17322⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3564 -ip 35641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3564 -ip 35641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3564 -ip 35641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3564 -ip 35641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 3564 -ip 35641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 3564 -ip 35641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 3564 -ip 35641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 3564 -ip 35641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3564 -ip 35641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3564 -ip 35641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3564 -ip 35641⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\VZQAW3IB\advdlc[1].htmFilesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
memory/3564-2-0x00000000023A0000-0x00000000023DC000-memory.dmpFilesize
240KB
-
memory/3564-1-0x0000000000780000-0x0000000000880000-memory.dmpFilesize
1024KB
-
memory/3564-3-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/3564-8-0x0000000010000000-0x000000001001C000-memory.dmpFilesize
112KB
-
memory/3564-15-0x0000000000400000-0x0000000000695000-memory.dmpFilesize
2.6MB
-
memory/3564-22-0x00000000023A0000-0x00000000023DC000-memory.dmpFilesize
240KB
-
memory/3564-21-0x0000000000780000-0x0000000000880000-memory.dmpFilesize
1024KB
-
memory/3564-25-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/3564-35-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/3564-34-0x0000000000400000-0x0000000000695000-memory.dmpFilesize
2.6MB