Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    24s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/06/2023, 05:39

General

  • Target

    euassb.exe

  • Size

    339KB

  • MD5

    5e1592f12f2c04eab3731d184298a30b

  • SHA1

    01e5edaa39c9ceead16ed6cedca0744a2242400d

  • SHA256

    79a98e38753880d1a0a288fc0380de5b6c03c0550007d86ad9fb33685369b0b3

  • SHA512

    7d9eac76eb9e1141291e991a30f49a57e2eb50361837c7e71cb8f34b7016639f2e88bf22cf1f4b5546b3486e1d1a16f8d16b50f22006750b0c008c37c520db92

  • SSDEEP

    6144:bmOPbtybqh+/fDv9vE5R1bHfxSqCcoVzqzXLkFmSRr/:ft2W+nz9s5RzCcoszX0mer/

Score
10/10

Malware Config

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Loads dropped DLL 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\euassb.exe
    "C:\Users\Admin\AppData\Local\Temp\euassb.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    PID:4160
    • C:\Users\Admin\AppData\Local\Temp\euassb.exe
      "C:\Users\Admin\AppData\Local\Temp\euassb.exe"
      2⤵
        PID:2076
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2076 -s 1240
          3⤵
          • Program crash
          PID:2420
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2076 -ip 2076
      1⤵
        PID:744

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\nsp8766.tmp\System.dll

        Filesize

        11KB

        MD5

        8b3830b9dbf87f84ddd3b26645fed3a0

        SHA1

        223bef1f19e644a610a0877d01eadc9e28299509

        SHA256

        f004c568d305cd95edbd704166fcd2849d395b595dff814bcc2012693527ac37

        SHA512

        d13cfd98db5ca8dc9c15723eee0e7454975078a776bce26247228be4603a0217e166058ebadc68090afe988862b7514cb8cb84de13b3de35737412a6f0a8ac03

      • memory/2076-146-0x0000000000400000-0x0000000001654000-memory.dmp

        Filesize

        18.3MB

      • memory/2076-147-0x0000000001660000-0x000000000381E000-memory.dmp

        Filesize

        33.7MB

      • memory/2076-152-0x0000000001660000-0x000000000381E000-memory.dmp

        Filesize

        33.7MB

      • memory/2076-153-0x0000000001660000-0x000000000381E000-memory.dmp

        Filesize

        33.7MB

      • memory/2076-154-0x0000000001660000-0x000000000381E000-memory.dmp

        Filesize

        33.7MB

      • memory/2076-161-0x0000000000080000-0x0000000000087000-memory.dmp

        Filesize

        28KB

      • memory/2076-162-0x0000000033BE0000-0x0000000033FE0000-memory.dmp

        Filesize

        4.0MB

      • memory/2076-163-0x0000000033BE0000-0x0000000033FE0000-memory.dmp

        Filesize

        4.0MB

      • memory/2076-164-0x0000000001660000-0x000000000381E000-memory.dmp

        Filesize

        33.7MB

      • memory/4160-144-0x00000000049E0000-0x0000000006B9E000-memory.dmp

        Filesize

        33.7MB

      • memory/4160-145-0x00000000049E0000-0x0000000006B9E000-memory.dmp

        Filesize

        33.7MB