Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16/08/2023, 13:35
Static task
static1
Behavioral task
behavioral1
Sample
Erstatningssprgsmaalene.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Erstatningssprgsmaalene.exe
Resource
win10v2004-20230703-en
General
-
Target
Erstatningssprgsmaalene.exe
-
Size
569KB
-
MD5
441f580a20127b9fc7b674209bfcea31
-
SHA1
48ee7b2e8265cdb7f9bd3fd3c62915d82e4494ab
-
SHA256
52424464d6caddf99763a3afff654a51604abf89ab0e4d8df656bc6e21528bf2
-
SHA512
6f3784218bbee4cc9cfefb77c1970bc82617b2aa6082316cfced38e2600084fa1ca593bf02fdb13a9045211e863e086c5f094f9bfb54241050e042d8c2d9682b
-
SSDEEP
6144:dZ/qRr6PRb3dOEP2KtbRyu7tnWiEHyekMNpVlLwseBI5AUBExksKcDTUaEne0oj:dBXPB4M2KDyu8/FflL2IqboPaV0g
Malware Config
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Checks QEMU agent file 2 TTPs 2 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
description ioc Process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe Erstatningssprgsmaalene.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe Erstatningssprgsmaalene.exe -
Loads dropped DLL 1 IoCs
pid Process 4852 Erstatningssprgsmaalene.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4528 Erstatningssprgsmaalene.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4852 Erstatningssprgsmaalene.exe 4528 Erstatningssprgsmaalene.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4852 set thread context of 4528 4852 Erstatningssprgsmaalene.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4852 Erstatningssprgsmaalene.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4852 wrote to memory of 4528 4852 Erstatningssprgsmaalene.exe 91 PID 4852 wrote to memory of 4528 4852 Erstatningssprgsmaalene.exe 91 PID 4852 wrote to memory of 4528 4852 Erstatningssprgsmaalene.exe 91 PID 4852 wrote to memory of 4528 4852 Erstatningssprgsmaalene.exe 91 PID 4852 wrote to memory of 4528 4852 Erstatningssprgsmaalene.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\Erstatningssprgsmaalene.exe"C:\Users\Admin\AppData\Local\Temp\Erstatningssprgsmaalene.exe"1⤵
- Checks QEMU agent file
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\Erstatningssprgsmaalene.exe"C:\Users\Admin\AppData\Local\Temp\Erstatningssprgsmaalene.exe"2⤵
- Checks QEMU agent file
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5ee260c45e97b62a5e42f17460d406068
SHA1df35f6300a03c4d3d3bd69752574426296b78695
SHA256e94a1f7bcd7e0d532b660d0af468eb3321536c3efdca265e61f9ec174b1aef27
SHA512a98f350d17c9057f33e5847462a87d59cbf2aaeda7f6299b0d49bb455e484ce4660c12d2eb8c4a0d21df523e729222bbd6c820bf25b081bc7478152515b414b3