Analysis

  • max time kernel
    149s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/07/2023, 06:33

General

  • Target

    a15da9fdfd935a4b05adc5e0cf0053a0.exe

  • Size

    352KB

  • MD5

    a15da9fdfd935a4b05adc5e0cf0053a0

  • SHA1

    71be4a53794322a70c36f22a532bdd5a9e82c47a

  • SHA256

    2a831c8d63686e4b79cfced16e26d47f95de8cdbd178876659f9e7ec75e42789

  • SHA512

    7035c68e51f340633b4b1a1d2e0c3d9f91ccf8398936a9604ec1119b0880d53360e213f04e0243ef9ac69cd2a23614e243533dd3494ff84854e1763606fa3d8e

  • SSDEEP

    6144:Hwq3NpAucY3Mh7fR6dtdKE0CuLavZDC8xr3gKkYbrx+gb6e+D:HzMp3cfKE7ZDCC1rrx+Ve+D

Malware Config

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Checks QEMU agent file 2 TTPs 2 IoCs

    Checks presence of QEMU agent, possibly to detect virtualization.

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a15da9fdfd935a4b05adc5e0cf0053a0.exe
    "C:\Users\Admin\AppData\Local\Temp\a15da9fdfd935a4b05adc5e0cf0053a0.exe"
    1⤵
    • Checks QEMU agent file
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:4788
    • C:\Users\Admin\AppData\Local\Temp\a15da9fdfd935a4b05adc5e0cf0053a0.exe
      "C:\Users\Admin\AppData\Local\Temp\a15da9fdfd935a4b05adc5e0cf0053a0.exe"
      2⤵
      • Checks QEMU agent file
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:4860

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\nsy9CCE.tmp\System.dll

          Filesize

          11KB

          MD5

          17ed1c86bd67e78ade4712be48a7d2bd

          SHA1

          1cc9fe86d6d6030b4dae45ecddce5907991c01a0

          SHA256

          bd046e6497b304e4ea4ab102cab2b1f94ce09bde0eebba4c59942a732679e4eb

          SHA512

          0cbed521e7d6d1f85977b3f7d3ca7ac34e1b5495b69fd8c7bfa1a846baf53b0ecd06fe1ad02a3599082ffacaf8c71a3bb4e32dec05f8e24859d736b828092cd5

        • C:\Users\Admin\AppData\Local\Temp\nsy9CCE.tmp\System.dll

          Filesize

          11KB

          MD5

          17ed1c86bd67e78ade4712be48a7d2bd

          SHA1

          1cc9fe86d6d6030b4dae45ecddce5907991c01a0

          SHA256

          bd046e6497b304e4ea4ab102cab2b1f94ce09bde0eebba4c59942a732679e4eb

          SHA512

          0cbed521e7d6d1f85977b3f7d3ca7ac34e1b5495b69fd8c7bfa1a846baf53b0ecd06fe1ad02a3599082ffacaf8c71a3bb4e32dec05f8e24859d736b828092cd5

        • C:\Users\Admin\AppData\Local\Temp\nsy9CCE.tmp\System.dll

          Filesize

          11KB

          MD5

          17ed1c86bd67e78ade4712be48a7d2bd

          SHA1

          1cc9fe86d6d6030b4dae45ecddce5907991c01a0

          SHA256

          bd046e6497b304e4ea4ab102cab2b1f94ce09bde0eebba4c59942a732679e4eb

          SHA512

          0cbed521e7d6d1f85977b3f7d3ca7ac34e1b5495b69fd8c7bfa1a846baf53b0ecd06fe1ad02a3599082ffacaf8c71a3bb4e32dec05f8e24859d736b828092cd5

        • memory/4788-146-0x00000000078D0000-0x000000000903C000-memory.dmp

          Filesize

          23.4MB

        • memory/4788-147-0x00000000078D0000-0x000000000903C000-memory.dmp

          Filesize

          23.4MB

        • memory/4788-148-0x0000000077BD1000-0x0000000077CF1000-memory.dmp

          Filesize

          1.1MB

        • memory/4788-149-0x0000000010000000-0x0000000010006000-memory.dmp

          Filesize

          24KB

        • memory/4860-150-0x0000000000400000-0x0000000001654000-memory.dmp

          Filesize

          18.3MB

        • memory/4860-151-0x0000000001660000-0x0000000002DCC000-memory.dmp

          Filesize

          23.4MB

        • memory/4860-152-0x0000000077C58000-0x0000000077C59000-memory.dmp

          Filesize

          4KB

        • memory/4860-153-0x0000000001660000-0x0000000002DCC000-memory.dmp

          Filesize

          23.4MB

        • memory/4860-155-0x0000000077BD1000-0x0000000077CF1000-memory.dmp

          Filesize

          1.1MB