Resubmissions

20-07-2021 11:03

210720-nzqxzersjs 10

20-07-2021 10:57

210720-n32mpq7vnn 10

Analysis

  • max time kernel
    297s
  • max time network
    276s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    20-07-2021 11:03

General

  • Target

    Despacho_de_informacion.doc

  • Size

    178KB

  • MD5

    d51027ccc08c7a7bf42e481e85196136

  • SHA1

    02abd7025f5e3a721676714410c66fc5b8d95f22

  • SHA256

    38473a7da74c7513b8b26550778e6c10337bfa0c8037a5ec1040200c324dcc5b

  • SHA512

    008279cd4e860de0279b66eac71e2b9da31418e566d2e8f6be4e59cfdb7f192614aaeb838d1a3fea151804ec0f2fac6b093127fe1c8cdfc86c9caacfa69f0fc4

Score
10/10

Malware Config

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Executes dropped EXE 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Despacho_de_informacion.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3164
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\PQMYHDUMN.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\PQMYHDUMN.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1264

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\PQMYHDUMN.exe
    MD5

    1d0e9d6e32cc4fb843df30b40fb3b0b9

    SHA1

    ac2344b40eef61eb1bfc845b3aa521f6c1f61d4c

    SHA256

    762b2ef80d674e85ebbd092a060a3dc787195af38bb85c4ac4774fcf320fd665

    SHA512

    bb09b63307356414347593063b646f0fa2e6cf37907964051eae95e96b781885c5abc374d2913ef03c472186ba7e0d2f7914fc27e9c04767efff91406c2ef94b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\PQMYHDUMN.exe
    MD5

    1d0e9d6e32cc4fb843df30b40fb3b0b9

    SHA1

    ac2344b40eef61eb1bfc845b3aa521f6c1f61d4c

    SHA256

    762b2ef80d674e85ebbd092a060a3dc787195af38bb85c4ac4774fcf320fd665

    SHA512

    bb09b63307356414347593063b646f0fa2e6cf37907964051eae95e96b781885c5abc374d2913ef03c472186ba7e0d2f7914fc27e9c04767efff91406c2ef94b

  • memory/1264-267-0x0000000000000000-mapping.dmp
  • memory/1264-273-0x00000000021C0000-0x00000000021E9000-memory.dmp
    Filesize

    164KB

  • memory/3164-114-0x00007FFD35790000-0x00007FFD357A0000-memory.dmp
    Filesize

    64KB

  • memory/3164-115-0x00007FFD35790000-0x00007FFD357A0000-memory.dmp
    Filesize

    64KB

  • memory/3164-116-0x00007FFD35790000-0x00007FFD357A0000-memory.dmp
    Filesize

    64KB

  • memory/3164-117-0x00007FFD35790000-0x00007FFD357A0000-memory.dmp
    Filesize

    64KB

  • memory/3164-119-0x00007FFD35790000-0x00007FFD357A0000-memory.dmp
    Filesize

    64KB

  • memory/3164-118-0x00007FFD575D0000-0x00007FFD5A0F3000-memory.dmp
    Filesize

    43.1MB

  • memory/3164-122-0x00007FFD50240000-0x00007FFD5132E000-memory.dmp
    Filesize

    16.9MB

  • memory/3164-123-0x00007FFD4E340000-0x00007FFD50235000-memory.dmp
    Filesize

    31.0MB