Analysis

  • max time kernel
    117s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13/09/2023, 13:41

General

  • Target

    tmp.exe

  • Size

    591KB

  • MD5

    de80b6794e46e172a649b33133d03f70

  • SHA1

    feb992fc88156fbd42b3a524d41bc04f89e93ca8

  • SHA256

    97a978ec855f5da30b8ab14b02106e6f7ead6ed740a0bdb03c79645aafc1be97

  • SHA512

    6997c25b6cac1d836271d5138c21ac384e77679b6081a5947701291b83fe3bd21e40dbd59085cadddf3a42ab9965a61e8a149ed7bda860a9dc6b4c41548b91f3

  • SSDEEP

    6144:SgORa6xKTuuuqjL7IMLeSfmDJsWYgYCoSzHigGnQi6VARkozzADTDAM87D+Uhqdy:Sgm/SRWhoSzhUMAaozFM876UhqdetYE

Score
10/10

Malware Config

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Loads dropped DLL 8 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2812
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2812 -s 552
      2⤵
      • Program crash
      PID:528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nst6C2D.tmp\System.dll

    Filesize

    12KB

    MD5

    6e55a6e7c3fdbd244042eb15cb1ec739

    SHA1

    070ea80e2192abc42f358d47b276990b5fa285a9

    SHA256

    acf90ab6f4edc687e94aaf604d05e16e6cfb5e35873783b50c66f307a35c6506

    SHA512

    2d504b74da38edc967e3859733a2a9cacd885db82f0ca69bfb66872e882707314c54238344d45945dc98bae85772aceef71a741787922d640627d3c8ae8f1c35

  • C:\Users\Admin\AppData\Local\Temp\nst6C2D.tmp\nsExec.dll

    Filesize

    7KB

    MD5

    ec9c99216ef11cdd85965e78bc797d2c

    SHA1

    1d5f93fbf4f8aab8164b109e9e1768e7b80ad88c

    SHA256

    c1b7c3ef8b77a5bb335dc9ec9c3546b249014dde43aa2a9ed719b4d5933741df

    SHA512

    35ff522c4efb3875fce0d6dce438f5225e5f27b414e7c16df88031e90b528c057fe10b4bbf755445c0500c3521e0797f562690aa7209f588169164bbfaceaba1

  • \Users\Admin\AppData\Local\Temp\nst6C2D.tmp\System.dll

    Filesize

    12KB

    MD5

    6e55a6e7c3fdbd244042eb15cb1ec739

    SHA1

    070ea80e2192abc42f358d47b276990b5fa285a9

    SHA256

    acf90ab6f4edc687e94aaf604d05e16e6cfb5e35873783b50c66f307a35c6506

    SHA512

    2d504b74da38edc967e3859733a2a9cacd885db82f0ca69bfb66872e882707314c54238344d45945dc98bae85772aceef71a741787922d640627d3c8ae8f1c35

  • \Users\Admin\AppData\Local\Temp\nst6C2D.tmp\System.dll

    Filesize

    12KB

    MD5

    6e55a6e7c3fdbd244042eb15cb1ec739

    SHA1

    070ea80e2192abc42f358d47b276990b5fa285a9

    SHA256

    acf90ab6f4edc687e94aaf604d05e16e6cfb5e35873783b50c66f307a35c6506

    SHA512

    2d504b74da38edc967e3859733a2a9cacd885db82f0ca69bfb66872e882707314c54238344d45945dc98bae85772aceef71a741787922d640627d3c8ae8f1c35

  • \Users\Admin\AppData\Local\Temp\nst6C2D.tmp\nsExec.dll

    Filesize

    7KB

    MD5

    ec9c99216ef11cdd85965e78bc797d2c

    SHA1

    1d5f93fbf4f8aab8164b109e9e1768e7b80ad88c

    SHA256

    c1b7c3ef8b77a5bb335dc9ec9c3546b249014dde43aa2a9ed719b4d5933741df

    SHA512

    35ff522c4efb3875fce0d6dce438f5225e5f27b414e7c16df88031e90b528c057fe10b4bbf755445c0500c3521e0797f562690aa7209f588169164bbfaceaba1

  • \Users\Admin\AppData\Local\Temp\nst6C2D.tmp\nsExec.dll

    Filesize

    7KB

    MD5

    ec9c99216ef11cdd85965e78bc797d2c

    SHA1

    1d5f93fbf4f8aab8164b109e9e1768e7b80ad88c

    SHA256

    c1b7c3ef8b77a5bb335dc9ec9c3546b249014dde43aa2a9ed719b4d5933741df

    SHA512

    35ff522c4efb3875fce0d6dce438f5225e5f27b414e7c16df88031e90b528c057fe10b4bbf755445c0500c3521e0797f562690aa7209f588169164bbfaceaba1

  • \Users\Admin\AppData\Local\Temp\nst6C2D.tmp\nsExec.dll

    Filesize

    7KB

    MD5

    ec9c99216ef11cdd85965e78bc797d2c

    SHA1

    1d5f93fbf4f8aab8164b109e9e1768e7b80ad88c

    SHA256

    c1b7c3ef8b77a5bb335dc9ec9c3546b249014dde43aa2a9ed719b4d5933741df

    SHA512

    35ff522c4efb3875fce0d6dce438f5225e5f27b414e7c16df88031e90b528c057fe10b4bbf755445c0500c3521e0797f562690aa7209f588169164bbfaceaba1

  • \Users\Admin\AppData\Local\Temp\nst6C2D.tmp\nsExec.dll

    Filesize

    7KB

    MD5

    ec9c99216ef11cdd85965e78bc797d2c

    SHA1

    1d5f93fbf4f8aab8164b109e9e1768e7b80ad88c

    SHA256

    c1b7c3ef8b77a5bb335dc9ec9c3546b249014dde43aa2a9ed719b4d5933741df

    SHA512

    35ff522c4efb3875fce0d6dce438f5225e5f27b414e7c16df88031e90b528c057fe10b4bbf755445c0500c3521e0797f562690aa7209f588169164bbfaceaba1

  • \Users\Admin\AppData\Local\Temp\nst6C2D.tmp\nsExec.dll

    Filesize

    7KB

    MD5

    ec9c99216ef11cdd85965e78bc797d2c

    SHA1

    1d5f93fbf4f8aab8164b109e9e1768e7b80ad88c

    SHA256

    c1b7c3ef8b77a5bb335dc9ec9c3546b249014dde43aa2a9ed719b4d5933741df

    SHA512

    35ff522c4efb3875fce0d6dce438f5225e5f27b414e7c16df88031e90b528c057fe10b4bbf755445c0500c3521e0797f562690aa7209f588169164bbfaceaba1

  • \Users\Admin\AppData\Local\Temp\nst6C2D.tmp\nsExec.dll

    Filesize

    7KB

    MD5

    ec9c99216ef11cdd85965e78bc797d2c

    SHA1

    1d5f93fbf4f8aab8164b109e9e1768e7b80ad88c

    SHA256

    c1b7c3ef8b77a5bb335dc9ec9c3546b249014dde43aa2a9ed719b4d5933741df

    SHA512

    35ff522c4efb3875fce0d6dce438f5225e5f27b414e7c16df88031e90b528c057fe10b4bbf755445c0500c3521e0797f562690aa7209f588169164bbfaceaba1

  • memory/2812-38-0x00000000039C0000-0x000000000528E000-memory.dmp

    Filesize

    24.8MB

  • memory/2812-39-0x00000000039C0000-0x000000000528E000-memory.dmp

    Filesize

    24.8MB