Analysis

  • max time kernel
    141s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    23-06-2022 14:09

General

  • Target

    Halkbank_Ekstre_230622_073809_405251.exe

  • Size

    846KB

  • MD5

    67159835537fc063197f0a1a03a69d1e

  • SHA1

    28544f5e2a9eb0281d1c3de050894a2a56e0c3f1

  • SHA256

    d4cbb8ee95410e64496a03b1a23868cdbe0c87e497671e39a0a23e20bd1f4179

  • SHA512

    508f093f38d7befce08282c1f243a984b16e5262ac8190cab57a056860305f0a470ec932127a30123ded315a74c044b45b423695dc13e3045f14c05672c378fb

Score
10/10

Malware Config

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Halkbank_Ekstre_230622_073809_405251.exe
    "C:\Users\Admin\AppData\Local\Temp\Halkbank_Ekstre_230622_073809_405251.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    PID:4944

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsv62A9.tmp\System.dll
    Filesize

    12KB

    MD5

    cff85c549d536f651d4fb8387f1976f2

    SHA1

    d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e

    SHA256

    8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8

    SHA512

    531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88

  • C:\Users\Admin\AppData\Local\Temp\nsv62A9.tmp\nsDialogs.dll
    Filesize

    9KB

    MD5

    6c3f8c94d0727894d706940a8a980543

    SHA1

    0d1bcad901be377f38d579aafc0c41c0ef8dcefd

    SHA256

    56b96add1978b1abba286f7f8982b0efbe007d4a48b3ded6a4d408e01d753fe2

    SHA512

    2094f0e4bb7c806a5ff27f83a1d572a5512d979eefda3345baff27d2c89e828f68466d08c3ca250da11b01fc0407a21743037c25e94fbe688566dd7deaebd355

  • memory/4944-132-0x00000000049B0000-0x0000000004AB0000-memory.dmp
    Filesize

    1024KB

  • memory/4944-133-0x00000000049B0000-0x0000000004AB0000-memory.dmp
    Filesize

    1024KB