Analysis
-
max time kernel
192s -
max time network
303s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
13-06-2024 23:24
Static task
static1
Behavioral task
behavioral1
Sample
7f73e5b49b63d597dd5b0acf769ae40f37d69d48562cdaf70b62fba6d7dc38fa.exe
Resource
win7-20240220-en
General
-
Target
7f73e5b49b63d597dd5b0acf769ae40f37d69d48562cdaf70b62fba6d7dc38fa.exe
-
Size
332KB
-
MD5
5ba6c06b6430b1d0ce57ada8d2d72613
-
SHA1
eb9829f22290617f07f4470b31f919168b65b29c
-
SHA256
7f73e5b49b63d597dd5b0acf769ae40f37d69d48562cdaf70b62fba6d7dc38fa
-
SHA512
dd63eca21ee1c1697756c1189e4ec8e59afbaa998c623de0e8a45d0c214dc011e5aa7d23b4fd27a82a7cc681668f6e7e38d94f0e4727d7956ae2f649a3aa747f
-
SSDEEP
6144:fato6hkvHnD2WM+RXPCtyyzDeTz2K6Fb4T:fatoNvitBzDeTz2KL
Malware Config
Extracted
gcleaner
185.172.128.90
185.172.128.69
-
url_path
/advdlc.php
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 8 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4668 1768 WerFault.exe 7f73e5b49b63d597dd5b0acf769ae40f37d69d48562cdaf70b62fba6d7dc38fa.exe 212 1768 WerFault.exe 7f73e5b49b63d597dd5b0acf769ae40f37d69d48562cdaf70b62fba6d7dc38fa.exe 4148 1768 WerFault.exe 7f73e5b49b63d597dd5b0acf769ae40f37d69d48562cdaf70b62fba6d7dc38fa.exe 2704 1768 WerFault.exe 7f73e5b49b63d597dd5b0acf769ae40f37d69d48562cdaf70b62fba6d7dc38fa.exe 312 1768 WerFault.exe 7f73e5b49b63d597dd5b0acf769ae40f37d69d48562cdaf70b62fba6d7dc38fa.exe 3468 1768 WerFault.exe 7f73e5b49b63d597dd5b0acf769ae40f37d69d48562cdaf70b62fba6d7dc38fa.exe 2324 1768 WerFault.exe 7f73e5b49b63d597dd5b0acf769ae40f37d69d48562cdaf70b62fba6d7dc38fa.exe 1716 1768 WerFault.exe 7f73e5b49b63d597dd5b0acf769ae40f37d69d48562cdaf70b62fba6d7dc38fa.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 428 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 428 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
7f73e5b49b63d597dd5b0acf769ae40f37d69d48562cdaf70b62fba6d7dc38fa.execmd.exedescription pid process target process PID 1768 wrote to memory of 1724 1768 7f73e5b49b63d597dd5b0acf769ae40f37d69d48562cdaf70b62fba6d7dc38fa.exe cmd.exe PID 1768 wrote to memory of 1724 1768 7f73e5b49b63d597dd5b0acf769ae40f37d69d48562cdaf70b62fba6d7dc38fa.exe cmd.exe PID 1768 wrote to memory of 1724 1768 7f73e5b49b63d597dd5b0acf769ae40f37d69d48562cdaf70b62fba6d7dc38fa.exe cmd.exe PID 1724 wrote to memory of 428 1724 cmd.exe taskkill.exe PID 1724 wrote to memory of 428 1724 cmd.exe taskkill.exe PID 1724 wrote to memory of 428 1724 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f73e5b49b63d597dd5b0acf769ae40f37d69d48562cdaf70b62fba6d7dc38fa.exe"C:\Users\Admin\AppData\Local\Temp\7f73e5b49b63d597dd5b0acf769ae40f37d69d48562cdaf70b62fba6d7dc38fa.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 7602⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 7802⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 8402⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 8842⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 9442⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 10922⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 11402⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 14322⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "7f73e5b49b63d597dd5b0acf769ae40f37d69d48562cdaf70b62fba6d7dc38fa.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7f73e5b49b63d597dd5b0acf769ae40f37d69d48562cdaf70b62fba6d7dc38fa.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "7f73e5b49b63d597dd5b0acf769ae40f37d69d48562cdaf70b62fba6d7dc38fa.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\E49JWOHD\advdlc[1].htmFilesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
memory/1768-1-0x00000000007E0000-0x00000000008E0000-memory.dmpFilesize
1024KB
-
memory/1768-3-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1768-2-0x00000000008E0000-0x000000000090D000-memory.dmpFilesize
180KB
-
memory/1768-9-0x0000000000400000-0x000000000068B000-memory.dmpFilesize
2.5MB
-
memory/1768-14-0x00000000007E0000-0x00000000008E0000-memory.dmpFilesize
1024KB
-
memory/1768-15-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1768-22-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1768-21-0x0000000000400000-0x000000000068B000-memory.dmpFilesize
2.5MB