Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
12/07/2024, 05:45
Static task
static1
Behavioral task
behavioral1
Sample
f03e8b7cb69fb4f0c4547257a4952a0c5be8f76dff3fddd0d161b099480df0b9.exe
Resource
win10v2004-20240709-en
General
-
Target
f03e8b7cb69fb4f0c4547257a4952a0c5be8f76dff3fddd0d161b099480df0b9.exe
-
Size
311KB
-
MD5
c97388da696eb8faa014fe1bfd156874
-
SHA1
855a68cc100fae5e51a9cb1f79c80ce0989e00ed
-
SHA256
f03e8b7cb69fb4f0c4547257a4952a0c5be8f76dff3fddd0d161b099480df0b9
-
SHA512
d01f4d789c2102d8d50b237360dba661a0970c8625dacaf36385792eb2723cd7301642f8d41fb15f90393c7c4b792a585ccc6b6bc3020a3e96f41d0d6178af4d
-
SSDEEP
3072:ukqx3j3DBWYiAVf/45nW6q8eEaoHiskQIUITJBKSvB4bqq5jS3Me308TXGs/N:uj3pndf/2W6gEaokhBPvBzee35V/
Malware Config
Extracted
gcleaner
185.172.128.90
185.172.128.69
-
url_path
/advdlc.php
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 8 IoCs
pid pid_target Process procid_target 4968 3476 WerFault.exe 80 760 3476 WerFault.exe 80 4856 3476 WerFault.exe 80 4256 3476 WerFault.exe 80 1708 3476 WerFault.exe 80 3832 3476 WerFault.exe 80 2432 3476 WerFault.exe 80 2096 3476 WerFault.exe 80 -
Kills process with taskkill 1 IoCs
pid Process 4424 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4424 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3476 wrote to memory of 240 3476 f03e8b7cb69fb4f0c4547257a4952a0c5be8f76dff3fddd0d161b099480df0b9.exe 98 PID 3476 wrote to memory of 240 3476 f03e8b7cb69fb4f0c4547257a4952a0c5be8f76dff3fddd0d161b099480df0b9.exe 98 PID 3476 wrote to memory of 240 3476 f03e8b7cb69fb4f0c4547257a4952a0c5be8f76dff3fddd0d161b099480df0b9.exe 98 PID 240 wrote to memory of 4424 240 cmd.exe 101 PID 240 wrote to memory of 4424 240 cmd.exe 101 PID 240 wrote to memory of 4424 240 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\f03e8b7cb69fb4f0c4547257a4952a0c5be8f76dff3fddd0d161b099480df0b9.exe"C:\Users\Admin\AppData\Local\Temp\f03e8b7cb69fb4f0c4547257a4952a0c5be8f76dff3fddd0d161b099480df0b9.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3476 -s 7722⤵
- Program crash
PID:4968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3476 -s 8122⤵
- Program crash
PID:760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3476 -s 8322⤵
- Program crash
PID:4856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3476 -s 8002⤵
- Program crash
PID:4256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3476 -s 9522⤵
- Program crash
PID:1708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3476 -s 9562⤵
- Program crash
PID:3832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3476 -s 14322⤵
- Program crash
PID:2432
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "f03e8b7cb69fb4f0c4547257a4952a0c5be8f76dff3fddd0d161b099480df0b9.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\f03e8b7cb69fb4f0c4547257a4952a0c5be8f76dff3fddd0d161b099480df0b9.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "f03e8b7cb69fb4f0c4547257a4952a0c5be8f76dff3fddd0d161b099480df0b9.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4424
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3476 -s 15322⤵
- Program crash
PID:2096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3476 -ip 34761⤵PID:1680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3476 -ip 34761⤵PID:2952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3476 -ip 34761⤵PID:3620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3476 -ip 34761⤵PID:4544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3476 -ip 34761⤵PID:4892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3476 -ip 34761⤵PID:3508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3476 -ip 34761⤵PID:4696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3476 -ip 34761⤵PID:2948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99