Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 04:30
Static task
static1
Behavioral task
behavioral1
Sample
5445057585bd359cb8798d33c4d5f2b9.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5445057585bd359cb8798d33c4d5f2b9.exe
Resource
win10v2004-20231222-en
General
-
Target
5445057585bd359cb8798d33c4d5f2b9.exe
-
Size
184KB
-
MD5
5445057585bd359cb8798d33c4d5f2b9
-
SHA1
adffbbcd0611cc7a52f8d23c71e2a0a3add19d8f
-
SHA256
3d8e3c85b8910e3dbc426392456ba630c4ee3a6c0a5d93c818e0f5f80e723e5e
-
SHA512
d8eff83da3c07d0ba19b29f0a065a599bc615a09980b2558974a159ec05f3e3b445e31a4bdb24ce71ec0f9148593af5ceb7dfa468f9c89fe4ee413db50465272
-
SSDEEP
1536:RBI0auxZD+WtPIRo0ErH4F//yyubFy0aF8:RPjl+WtPI9fk9fJ
Malware Config
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Checks QEMU agent file 2 TTPs 2 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
description ioc Process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe 5445057585bd359cb8798d33c4d5f2b9.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe ieinstal.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\VOILEFURRO = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Advotere\\deathcupreducer.exe" ieinstal.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3020 5445057585bd359cb8798d33c4d5f2b9.exe 2972 ieinstal.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3020 set thread context of 2972 3020 5445057585bd359cb8798d33c4d5f2b9.exe 28 -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3020 5445057585bd359cb8798d33c4d5f2b9.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3020 5445057585bd359cb8798d33c4d5f2b9.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2972 3020 5445057585bd359cb8798d33c4d5f2b9.exe 28 PID 3020 wrote to memory of 2972 3020 5445057585bd359cb8798d33c4d5f2b9.exe 28 PID 3020 wrote to memory of 2972 3020 5445057585bd359cb8798d33c4d5f2b9.exe 28 PID 3020 wrote to memory of 2972 3020 5445057585bd359cb8798d33c4d5f2b9.exe 28 PID 3020 wrote to memory of 2972 3020 5445057585bd359cb8798d33c4d5f2b9.exe 28 PID 3020 wrote to memory of 2972 3020 5445057585bd359cb8798d33c4d5f2b9.exe 28 PID 3020 wrote to memory of 2972 3020 5445057585bd359cb8798d33c4d5f2b9.exe 28 PID 3020 wrote to memory of 2972 3020 5445057585bd359cb8798d33c4d5f2b9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5445057585bd359cb8798d33c4d5f2b9.exe"C:\Users\Admin\AppData\Local\Temp\5445057585bd359cb8798d33c4d5f2b9.exe"1⤵
- Checks QEMU agent file
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Users\Admin\AppData\Local\Temp\5445057585bd359cb8798d33c4d5f2b9.exe"2⤵
- Checks QEMU agent file
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD557b2f87904152c8275a3a3639daaaefd
SHA162db956bac5bc0b1f3bd4326c49326575065bbd5
SHA2565c4a4c2284874048c15f4ea6ca3eb80047c05b79fdca82565887df126fdca636
SHA512d3b7bfd9f3386839d325dec045fcc204c199b1460320c8e1ede196b88ec905e4ccde419b13c50e3470ce53558d01e5c5b657ce4cfbcd6ecb3c2289fb19b2c20e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5666f6bbb300915c45f8803bd0a7a457a
SHA1f4dc6a0b2cb131f847e837d4af7753329a664441
SHA256fd85a93a9dc3a6281d0582c1b0e268f17093703179aca35b49083dcd0c7243db
SHA512c106bc93c2e4c42ab2ac686669c9d564762a919772d038d928e33cd6d6c1bf5e4d5974222b576ee7986e373e1eca32dbbe979353854cba2e4ce6d0be75d82db7
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06