Analysis Overview
SHA256
e49fd2a82352a63a184372f5a71abf67cb1f9b709d4cf61d4de50194bdac57c3
Threat Level: Known bad
The file rStorhertugs.exe was found to be: Known bad.
Malicious Activity Summary
Guloader,Cloudeye
Loads dropped DLL
Enumerates physical storage devices
Program crash
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2023-08-07 21:34
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2023-08-07 21:34
Reported
2023-08-07 21:36
Platform
win7-20230712-en
Max time kernel
117s
Max time network
119s
Command Line
Signatures
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\rStorhertugs.exe | N/A |
Enumerates physical storage devices
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\rStorhertugs.exe |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 3016 wrote to memory of 2868 | N/A | C:\Users\Admin\AppData\Local\Temp\rStorhertugs.exe | C:\Windows\SysWOW64\WerFault.exe |
| PID 3016 wrote to memory of 2868 | N/A | C:\Users\Admin\AppData\Local\Temp\rStorhertugs.exe | C:\Windows\SysWOW64\WerFault.exe |
| PID 3016 wrote to memory of 2868 | N/A | C:\Users\Admin\AppData\Local\Temp\rStorhertugs.exe | C:\Windows\SysWOW64\WerFault.exe |
| PID 3016 wrote to memory of 2868 | N/A | C:\Users\Admin\AppData\Local\Temp\rStorhertugs.exe | C:\Windows\SysWOW64\WerFault.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\rStorhertugs.exe
"C:\Users\Admin\AppData\Local\Temp\rStorhertugs.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3016 -s 428
Network
Files
\Users\Admin\AppData\Local\Temp\nst8EE9.tmp\System.dll
| MD5 | 7399323923e3946fe9140132ac388132 |
| SHA1 | 728257d06c452449b1241769b459f091aabcffc5 |
| SHA256 | 5a1c20a3e2e2eb182976977669f2c5d9f3104477e98f74d69d2434e79b92fdc3 |
| SHA512 | d6f28ba761351f374ae007c780be27758aea7b9f998e2a88a542eede459d18700adffe71abcb52b8a8c00695efb7ccc280175b5eeb57ca9a645542edfabb64f1 |
memory/3016-64-0x0000000002F70000-0x0000000004859000-memory.dmp
memory/3016-65-0x0000000002F70000-0x0000000004859000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2023-08-07 21:34
Reported
2023-08-07 21:36
Platform
win10v2004-20230703-en
Max time kernel
143s
Max time network
153s
Command Line
Signatures
Guloader,Cloudeye
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\rStorhertugs.exe | N/A |
Enumerates physical storage devices
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\rStorhertugs.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\rStorhertugs.exe
"C:\Users\Admin\AppData\Local\Temp\rStorhertugs.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2576 -ip 2576
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 836
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 59.128.231.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 4.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 208.194.73.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.59.114.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 86.8.109.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 126.179.238.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 1.173.189.20.in-addr.arpa | udp |
Files
C:\Users\Admin\AppData\Local\Temp\nsy9B48.tmp\System.dll
| MD5 | 7399323923e3946fe9140132ac388132 |
| SHA1 | 728257d06c452449b1241769b459f091aabcffc5 |
| SHA256 | 5a1c20a3e2e2eb182976977669f2c5d9f3104477e98f74d69d2434e79b92fdc3 |
| SHA512 | d6f28ba761351f374ae007c780be27758aea7b9f998e2a88a542eede459d18700adffe71abcb52b8a8c00695efb7ccc280175b5eeb57ca9a645542edfabb64f1 |
memory/2576-144-0x0000000003130000-0x0000000004A19000-memory.dmp
memory/2576-145-0x0000000003130000-0x0000000004A19000-memory.dmp
memory/2576-146-0x0000000003130000-0x0000000004A19000-memory.dmp