Analysis
-
max time kernel
94s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 00:56
Static task
static1
Behavioral task
behavioral1
Sample
4d5d9aa1237b3899214ecea06ca4db46c194cf526d71defb3d8b81cadb97697c.exe
Resource
win7-20241010-en
General
-
Target
4d5d9aa1237b3899214ecea06ca4db46c194cf526d71defb3d8b81cadb97697c.exe
-
Size
299KB
-
MD5
ab1e6093f0d842a726bcf5ebb044693d
-
SHA1
7879bf7bba3bc9bcf86e90d9bfa09a45dc6a6789
-
SHA256
4d5d9aa1237b3899214ecea06ca4db46c194cf526d71defb3d8b81cadb97697c
-
SHA512
10a7527698533022a59ab1ebeaa008171b292364da727e80242dd786ded8ff09de6cf5f0c395f8c0a97073ab5bfbda5a8189c9baf45ed9d4e28ebdbb58de2441
-
SSDEEP
6144:UlrLHGvicYHCATJfvoD9oD1F4mhko0eanbDiljjJIPTgsl2:UpCvirlTxoy4O903nbDCj8vl2
Malware Config
Extracted
gcleaner
45.139.105.171
85.31.46.167
107.182.129.235
171.22.30.106
-
url_path
....!..../software.php
....!..../software.php
Signatures
-
Gcleaner family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4d5d9aa1237b3899214ecea06ca4db46c194cf526d71defb3d8b81cadb97697c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 7 IoCs
pid pid_target Process procid_target 264 4312 WerFault.exe 83 2896 4312 WerFault.exe 83 1160 4312 WerFault.exe 83 2816 4312 WerFault.exe 83 2260 4312 WerFault.exe 83 3608 4312 WerFault.exe 83 1464 4312 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4d5d9aa1237b3899214ecea06ca4db46c194cf526d71defb3d8b81cadb97697c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Kills process with taskkill 1 IoCs
pid Process 4596 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4596 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4312 wrote to memory of 4328 4312 4d5d9aa1237b3899214ecea06ca4db46c194cf526d71defb3d8b81cadb97697c.exe 97 PID 4312 wrote to memory of 4328 4312 4d5d9aa1237b3899214ecea06ca4db46c194cf526d71defb3d8b81cadb97697c.exe 97 PID 4312 wrote to memory of 4328 4312 4d5d9aa1237b3899214ecea06ca4db46c194cf526d71defb3d8b81cadb97697c.exe 97 PID 4328 wrote to memory of 4596 4328 cmd.exe 100 PID 4328 wrote to memory of 4596 4328 cmd.exe 100 PID 4328 wrote to memory of 4596 4328 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d5d9aa1237b3899214ecea06ca4db46c194cf526d71defb3d8b81cadb97697c.exe"C:\Users\Admin\AppData\Local\Temp\4d5d9aa1237b3899214ecea06ca4db46c194cf526d71defb3d8b81cadb97697c.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4312 -s 6882⤵
- Program crash
PID:264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4312 -s 7802⤵
- Program crash
PID:2896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4312 -s 9162⤵
- Program crash
PID:1160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4312 -s 7282⤵
- Program crash
PID:2816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4312 -s 7282⤵
- Program crash
PID:2260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4312 -s 9402⤵
- Program crash
PID:3608
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "4d5d9aa1237b3899214ecea06ca4db46c194cf526d71defb3d8b81cadb97697c.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\4d5d9aa1237b3899214ecea06ca4db46c194cf526d71defb3d8b81cadb97697c.exe" & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "4d5d9aa1237b3899214ecea06ca4db46c194cf526d71defb3d8b81cadb97697c.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4596
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4312 -s 10362⤵
- Program crash
PID:1464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4312 -ip 43121⤵PID:3544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4312 -ip 43121⤵PID:1920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4312 -ip 43121⤵PID:3124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4312 -ip 43121⤵PID:216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4312 -ip 43121⤵PID:2868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4312 -ip 43121⤵PID:5060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4312 -ip 43121⤵PID:3568