Analysis

  • max time kernel
    60s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2022, 15:58

General

  • Target

    2fe5d3d7cbc13f03b9a0f9003a398849ab0eb853b803fbc62b9daa680476eec1.exe

  • Size

    123KB

  • MD5

    8210e0cabbd4e79a621b30cfca2106db

  • SHA1

    592bd87ad32e2bf6f0a4d85d08002a9d2513c062

  • SHA256

    2fe5d3d7cbc13f03b9a0f9003a398849ab0eb853b803fbc62b9daa680476eec1

  • SHA512

    42829a1172ca142cacd0dce5c04db73e9e23568dad643f95d42212048275923e16993391b97c7d64c94b0d4c00c01932f3555b32e6dca1c819e9f4164d8f6781

  • SSDEEP

    3072:WuxVUg3yGDRb8lc7uO1AejubkEfDH4u3s3MXIbykqb:JgORafejuxfT4u16ub

Malware Config

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Loads dropped DLL 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2fe5d3d7cbc13f03b9a0f9003a398849ab0eb853b803fbc62b9daa680476eec1.exe
    "C:\Users\Admin\AppData\Local\Temp\2fe5d3d7cbc13f03b9a0f9003a398849ab0eb853b803fbc62b9daa680476eec1.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:1980

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nstA073.tmp\System.dll

    Filesize

    12KB

    MD5

    564bb0373067e1785cba7e4c24aab4bf

    SHA1

    7c9416a01d821b10b2eef97b80899d24014d6fc1

    SHA256

    7a9ddee34562cd3703f1502b5c70e99cd5bba15de2b6845a3555033d7f6cb2a5

    SHA512

    22c61a323cb9293d7ec5c7e7e60674d0e2f7b29d55be25eb3c128ea2cd7440a1400cee17c43896b996278007c0d247f331a9b8964e3a40a0eb1404a9596c4472

  • memory/1980-54-0x0000000076031000-0x0000000076033000-memory.dmp

    Filesize

    8KB

  • memory/1980-56-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/1980-57-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/1980-58-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB