Analysis
-
max time kernel
141s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 19:31
Static task
static1
Behavioral task
behavioral1
Sample
5dd9fb6f1ac968e565f74420d2b25bfb7a4245745e68f6e8d5c62fcf4968d93b.exe
Resource
win10v2004-20240802-en
General
-
Target
5dd9fb6f1ac968e565f74420d2b25bfb7a4245745e68f6e8d5c62fcf4968d93b.exe
-
Size
380KB
-
MD5
6b507f77fc357e100e017db7b6d97f97
-
SHA1
a479c0a43a8946b6dd08fd857524daeadb66ddf1
-
SHA256
5dd9fb6f1ac968e565f74420d2b25bfb7a4245745e68f6e8d5c62fcf4968d93b
-
SHA512
a07769d287503213fb50971f749782b1cd0be9e5d0a53b2ebd4090669243ca11493f44b3b98e124f82c22385b4cc9e6a041880b3a2d82d930d7ca613f9fb94dc
-
SSDEEP
6144:cxmET2obobSh03A65getrWyFgplUI4XHkUliqB/LCpzoWpmVePuf:cVqeobN5getzgplO2eW0
Malware Config
Extracted
gcleaner
80.66.75.114
45.91.200.135
Signatures
-
Downloads MZ/PE file
-
Program crash 9 IoCs
pid pid_target Process procid_target 540 2564 WerFault.exe 82 628 2564 WerFault.exe 82 1276 2564 WerFault.exe 82 4236 2564 WerFault.exe 82 400 2564 WerFault.exe 82 4732 2564 WerFault.exe 82 2392 2564 WerFault.exe 82 1952 2564 WerFault.exe 82 3388 2564 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5dd9fb6f1ac968e565f74420d2b25bfb7a4245745e68f6e8d5c62fcf4968d93b.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2564 5dd9fb6f1ac968e565f74420d2b25bfb7a4245745e68f6e8d5c62fcf4968d93b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5dd9fb6f1ac968e565f74420d2b25bfb7a4245745e68f6e8d5c62fcf4968d93b.exe"C:\Users\Admin\AppData\Local\Temp\5dd9fb6f1ac968e565f74420d2b25bfb7a4245745e68f6e8d5c62fcf4968d93b.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 4562⤵
- Program crash
PID:540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 7722⤵
- Program crash
PID:628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 6322⤵
- Program crash
PID:1276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 8162⤵
- Program crash
PID:4236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 8042⤵
- Program crash
PID:400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 9282⤵
- Program crash
PID:4732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 10002⤵
- Program crash
PID:2392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 10522⤵
- Program crash
PID:1952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 7762⤵
- Program crash
PID:3388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2564 -ip 25641⤵PID:4656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2564 -ip 25641⤵PID:3316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2564 -ip 25641⤵PID:536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2564 -ip 25641⤵PID:1712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2564 -ip 25641⤵PID:1300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 2564 -ip 25641⤵PID:3044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2564 -ip 25641⤵PID:372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 2564 -ip 25641⤵PID:5048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 2564 -ip 25641⤵PID:4000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99