Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 20:45
Static task
static1
Behavioral task
behavioral1
Sample
80fb1b508937b961b725c1f884cff5c71a9ea275adb1d355c637acfe9d5f4233.exe
Resource
win7-20240903-en
General
-
Target
80fb1b508937b961b725c1f884cff5c71a9ea275adb1d355c637acfe9d5f4233.exe
-
Size
287KB
-
MD5
e45038d0573912ea5c650de3b9cbb2cf
-
SHA1
5db032b838333982a375d9986bd95f4eb834c029
-
SHA256
80fb1b508937b961b725c1f884cff5c71a9ea275adb1d355c637acfe9d5f4233
-
SHA512
5f38546132e267894b0deb3119cbe7be33628f74edc9f8831fae55542ea77ddb0329f581ab3b7f54ebde85d076e2740876d6920f10903e066c7acb8f2ffacee2
-
SSDEEP
3072:nZXjDLbeLL5Bve2eK3nXSGs9Ee4QC10un+u/nivGL3h4FcpUqolyp0qEd1nsn:9HLqLvvencXg9Esal/io3ccgyKdla
Malware Config
Extracted
gcleaner
45.139.105.171
85.31.46.167
107.182.129.235
171.22.30.106
-
url_path
....!..../software.php
....!..../software.php
Signatures
-
Gcleaner family
-
Program crash 9 IoCs
pid pid_target Process procid_target 1848 4688 WerFault.exe 81 4040 4688 WerFault.exe 81 2964 4688 WerFault.exe 81 2900 4688 WerFault.exe 81 4608 4688 WerFault.exe 81 2060 4688 WerFault.exe 81 5060 4688 WerFault.exe 81 4572 4688 WerFault.exe 81 2756 4688 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80fb1b508937b961b725c1f884cff5c71a9ea275adb1d355c637acfe9d5f4233.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4688 80fb1b508937b961b725c1f884cff5c71a9ea275adb1d355c637acfe9d5f4233.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\80fb1b508937b961b725c1f884cff5c71a9ea275adb1d355c637acfe9d5f4233.exe"C:\Users\Admin\AppData\Local\Temp\80fb1b508937b961b725c1f884cff5c71a9ea275adb1d355c637acfe9d5f4233.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:4688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 4642⤵
- Program crash
PID:1848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 7642⤵
- Program crash
PID:4040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 8042⤵
- Program crash
PID:2964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 8082⤵
- Program crash
PID:2900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 8562⤵
- Program crash
PID:4608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 9282⤵
- Program crash
PID:2060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 10042⤵
- Program crash
PID:5060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 10922⤵
- Program crash
PID:4572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 7682⤵
- Program crash
PID:2756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4688 -ip 46881⤵PID:5000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4688 -ip 46881⤵PID:208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4688 -ip 46881⤵PID:5044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4688 -ip 46881⤵PID:3408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4688 -ip 46881⤵PID:3116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4688 -ip 46881⤵PID:2452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4688 -ip 46881⤵PID:3784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4688 -ip 46881⤵PID:1880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 4688 -ip 46881⤵PID:2964