Analysis
-
max time kernel
139s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 19:15
Static task
static1
Behavioral task
behavioral1
Sample
fee89deac4162c2e3516a5c72225f57f81662cabefefb8de06c8a7a77b9d10b5.exe
Resource
win10v2004-20240611-en
General
-
Target
fee89deac4162c2e3516a5c72225f57f81662cabefefb8de06c8a7a77b9d10b5.exe
-
Size
398KB
-
MD5
1ffc6e6d79fc16c389cb23c217bb3fad
-
SHA1
dfa799918f9aec45d0fdb5bfb3e03a89a77378ae
-
SHA256
fee89deac4162c2e3516a5c72225f57f81662cabefefb8de06c8a7a77b9d10b5
-
SHA512
d8dc035b7cd545287e0ea6f4ca7ce6eb1ed80ff00e10a4f1759f905fdb9be399565b65c0cf61dae3f746d979b36d4780b845115ef5b8c7167e14fdca77467fe9
-
SSDEEP
3072:vTS4zuqL65IW38lLOOqsPNRHPrvxAn99kNLYYb989AI50vSaK95qRJ9rfwzQT5bL:vWFqLfW3wv3HHrxA9ub9CIRLrf0w
Malware Config
Extracted
gcleaner
185.172.128.90
5.42.64.56
185.172.128.69
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation fee89deac4162c2e3516a5c72225f57f81662cabefefb8de06c8a7a77b9d10b5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 10 IoCs
pid pid_target Process procid_target 4996 1464 WerFault.exe 82 3148 1464 WerFault.exe 82 3632 1464 WerFault.exe 82 3044 1464 WerFault.exe 82 788 1464 WerFault.exe 82 1752 1464 WerFault.exe 82 1144 1464 WerFault.exe 82 2812 1464 WerFault.exe 82 912 1464 WerFault.exe 82 4308 1464 WerFault.exe 82 -
Kills process with taskkill 1 IoCs
pid Process 3096 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3096 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1464 wrote to memory of 4600 1464 fee89deac4162c2e3516a5c72225f57f81662cabefefb8de06c8a7a77b9d10b5.exe 113 PID 1464 wrote to memory of 4600 1464 fee89deac4162c2e3516a5c72225f57f81662cabefefb8de06c8a7a77b9d10b5.exe 113 PID 1464 wrote to memory of 4600 1464 fee89deac4162c2e3516a5c72225f57f81662cabefefb8de06c8a7a77b9d10b5.exe 113 PID 4600 wrote to memory of 3096 4600 cmd.exe 117 PID 4600 wrote to memory of 3096 4600 cmd.exe 117 PID 4600 wrote to memory of 3096 4600 cmd.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\fee89deac4162c2e3516a5c72225f57f81662cabefefb8de06c8a7a77b9d10b5.exe"C:\Users\Admin\AppData\Local\Temp\fee89deac4162c2e3516a5c72225f57f81662cabefefb8de06c8a7a77b9d10b5.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1464 -s 4682⤵
- Program crash
PID:4996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1464 -s 7642⤵
- Program crash
PID:3148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1464 -s 7642⤵
- Program crash
PID:3632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1464 -s 7962⤵
- Program crash
PID:3044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1464 -s 8362⤵
- Program crash
PID:788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1464 -s 8442⤵
- Program crash
PID:1752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1464 -s 8482⤵
- Program crash
PID:1144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1464 -s 11402⤵
- Program crash
PID:2812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1464 -s 16002⤵
- Program crash
PID:912
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "fee89deac4162c2e3516a5c72225f57f81662cabefefb8de06c8a7a77b9d10b5.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\fee89deac4162c2e3516a5c72225f57f81662cabefefb8de06c8a7a77b9d10b5.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "fee89deac4162c2e3516a5c72225f57f81662cabefefb8de06c8a7a77b9d10b5.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3096
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1464 -s 5242⤵
- Program crash
PID:4308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1464 -ip 14641⤵PID:3240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1464 -ip 14641⤵PID:3348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1464 -ip 14641⤵PID:4196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1464 -ip 14641⤵PID:1948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1464 -ip 14641⤵PID:1992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1464 -ip 14641⤵PID:2256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1464 -ip 14641⤵PID:3652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1464 -ip 14641⤵PID:4004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1464 -ip 14641⤵PID:1132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1464 -ip 14641⤵PID:2496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99