Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2024 17:51

General

  • Target

    7523103a55465d71b5686bf960694027.exe

  • Size

    152KB

  • MD5

    7523103a55465d71b5686bf960694027

  • SHA1

    e69d656bb003eaf6f3966e9bb89f9e14b191c960

  • SHA256

    dc818bb2797249f1cc13daf873c34127b1b3c8a6bf1ceb1fc7392613114c5269

  • SHA512

    17ecf4626a44a89ac8622d9755da3f64e679f9008283c2f95b7f3a4431023d1ee2f412c4f1fdd82e709d37ad5a4a98889e17352875da0813f84884742daa507c

  • SSDEEP

    1536:JhUoHf+unUoBn+RF95VmHFJ4c+2/S5B/8qxqlKVt1g+9u:TN2M8nclJ4cJGpBqlAguu

Malware Config

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Kinsing

    Kinsing is a loader written in Golang.

  • Checks QEMU agent file 2 TTPs 2 IoCs

    Checks presence of QEMU agent, possibly to detect virtualization.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7523103a55465d71b5686bf960694027.exe
    "C:\Users\Admin\AppData\Local\Temp\7523103a55465d71b5686bf960694027.exe"
    1⤵
    • Checks QEMU agent file
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:636
    • C:\Users\Admin\AppData\Local\Temp\7523103a55465d71b5686bf960694027.exe
      "C:\Users\Admin\AppData\Local\Temp\7523103a55465d71b5686bf960694027.exe"
      2⤵
      • Checks QEMU agent file
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:2356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/636-2-0x0000000002B60000-0x0000000002B73000-memory.dmp

    Filesize

    76KB

  • memory/636-3-0x0000000077B81000-0x0000000077CA1000-memory.dmp

    Filesize

    1.1MB

  • memory/636-6-0x0000000077B81000-0x0000000077CA1000-memory.dmp

    Filesize

    1.1MB

  • memory/636-7-0x0000000002B60000-0x0000000002B73000-memory.dmp

    Filesize

    76KB

  • memory/2356-4-0x0000000000400000-0x000000000055D000-memory.dmp

    Filesize

    1.4MB

  • memory/2356-8-0x0000000000560000-0x0000000000660000-memory.dmp

    Filesize

    1024KB

  • memory/2356-9-0x0000000077B81000-0x0000000077CA1000-memory.dmp

    Filesize

    1.1MB

  • memory/2356-19-0x0000000000400000-0x000000000055D000-memory.dmp

    Filesize

    1.4MB

  • memory/2356-20-0x0000000000560000-0x0000000000660000-memory.dmp

    Filesize

    1024KB