Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
12/07/2024, 06:50
Static task
static1
Behavioral task
behavioral1
Sample
49d274575d3cf8393711ba0738cd165afc46f5480d57a43b57972bba48ef03a6.exe
Resource
win10v2004-20240709-en
General
-
Target
49d274575d3cf8393711ba0738cd165afc46f5480d57a43b57972bba48ef03a6.exe
-
Size
345KB
-
MD5
a5a14b31163a4c9991600fa08612436b
-
SHA1
cbe157e0e4e1bb34764544bc1531bb5ed6e7528e
-
SHA256
49d274575d3cf8393711ba0738cd165afc46f5480d57a43b57972bba48ef03a6
-
SHA512
2cde2d6a873d4f72043089774db4d5207d4941a28640e5e8f536b2b3b7e9324fd9e62ad135ec4456d6b23ea132f1a61d04859814f25beb96bb8732b98be75bc4
-
SSDEEP
3072:P0WropQLfkHsFbOqU5PEws8r6VSOIf+yWRd+JmIDvbJnOvlwMchQ8j/:P0SopjsFbuMwsrSOIf+yWRdENbJn1BQ
Malware Config
Extracted
gcleaner
185.172.128.90
77.105.160.30
185.172.128.69
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2524 3376 WerFault.exe 80 -
Kills process with taskkill 1 IoCs
pid Process 4232 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4232 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3376 wrote to memory of 1380 3376 49d274575d3cf8393711ba0738cd165afc46f5480d57a43b57972bba48ef03a6.exe 84 PID 3376 wrote to memory of 1380 3376 49d274575d3cf8393711ba0738cd165afc46f5480d57a43b57972bba48ef03a6.exe 84 PID 3376 wrote to memory of 1380 3376 49d274575d3cf8393711ba0738cd165afc46f5480d57a43b57972bba48ef03a6.exe 84 PID 1380 wrote to memory of 4232 1380 cmd.exe 88 PID 1380 wrote to memory of 4232 1380 cmd.exe 88 PID 1380 wrote to memory of 4232 1380 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\49d274575d3cf8393711ba0738cd165afc46f5480d57a43b57972bba48ef03a6.exe"C:\Users\Admin\AppData\Local\Temp\49d274575d3cf8393711ba0738cd165afc46f5480d57a43b57972bba48ef03a6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "49d274575d3cf8393711ba0738cd165afc46f5480d57a43b57972bba48ef03a6.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\49d274575d3cf8393711ba0738cd165afc46f5480d57a43b57972bba48ef03a6.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "49d274575d3cf8393711ba0738cd165afc46f5480d57a43b57972bba48ef03a6.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4232
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3376 -s 5122⤵
- Program crash
PID:2524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3376 -ip 33761⤵PID:1588