Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-04-2024 01:18
Static task
static1
Behavioral task
behavioral1
Sample
76dbfa281b158a18c83d08a907f087b7330da28bdd2298eb9ee2f23c1df40491.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
76dbfa281b158a18c83d08a907f087b7330da28bdd2298eb9ee2f23c1df40491.exe
Resource
win10v2004-20240412-en
General
-
Target
76dbfa281b158a18c83d08a907f087b7330da28bdd2298eb9ee2f23c1df40491.exe
-
Size
776KB
-
MD5
1c089552c29f12843d8cd8e2bbf5cf5b
-
SHA1
6f3e611fc7d7d5938b99575bcd96366d6e213eab
-
SHA256
76dbfa281b158a18c83d08a907f087b7330da28bdd2298eb9ee2f23c1df40491
-
SHA512
3f6220ce4196ea9ec13ef699a8b8e51e8a7d5035511f8b252230bcc024e423610d5474587030f68dbfc5193bd02402975b6f71e9e352fd17453519748ab3a885
-
SSDEEP
12288:K0Z4SNwhFaoncbHNsyBNzjdsO8aIaLJtBT7bbQ4:J4SO/wbtsQ9jdsFaxl3bbT
Malware Config
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
powershell.exewab.exepid process 2828 powershell.exe 848 wab.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 2828 set thread context of 848 2828 powershell.exe wab.exe -
Drops file in Program Files directory 1 IoCs
Processes:
76dbfa281b158a18c83d08a907f087b7330da28bdd2298eb9ee2f23c1df40491.exedescription ioc process File opened for modification C:\Program Files (x86)\Common Files\driftssikkerer\brkkets.pla 76dbfa281b158a18c83d08a907f087b7330da28bdd2298eb9ee2f23c1df40491.exe -
Drops file in Windows directory 1 IoCs
Processes:
76dbfa281b158a18c83d08a907f087b7330da28bdd2298eb9ee2f23c1df40491.exedescription ioc process File opened for modification C:\Windows\resources\nonsubjectively\rygmarvsprven.ini 76dbfa281b158a18c83d08a907f087b7330da28bdd2298eb9ee2f23c1df40491.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
powershell.exepid process 2828 powershell.exe 2828 powershell.exe 2828 powershell.exe 2828 powershell.exe 2828 powershell.exe 2828 powershell.exe 2828 powershell.exe 2828 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
powershell.exepid process 2828 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2828 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
76dbfa281b158a18c83d08a907f087b7330da28bdd2298eb9ee2f23c1df40491.exepowershell.exedescription pid process target process PID 2936 wrote to memory of 2828 2936 76dbfa281b158a18c83d08a907f087b7330da28bdd2298eb9ee2f23c1df40491.exe powershell.exe PID 2936 wrote to memory of 2828 2936 76dbfa281b158a18c83d08a907f087b7330da28bdd2298eb9ee2f23c1df40491.exe powershell.exe PID 2936 wrote to memory of 2828 2936 76dbfa281b158a18c83d08a907f087b7330da28bdd2298eb9ee2f23c1df40491.exe powershell.exe PID 2936 wrote to memory of 2828 2936 76dbfa281b158a18c83d08a907f087b7330da28bdd2298eb9ee2f23c1df40491.exe powershell.exe PID 2828 wrote to memory of 2652 2828 powershell.exe cmd.exe PID 2828 wrote to memory of 2652 2828 powershell.exe cmd.exe PID 2828 wrote to memory of 2652 2828 powershell.exe cmd.exe PID 2828 wrote to memory of 2652 2828 powershell.exe cmd.exe PID 2828 wrote to memory of 848 2828 powershell.exe wab.exe PID 2828 wrote to memory of 848 2828 powershell.exe wab.exe PID 2828 wrote to memory of 848 2828 powershell.exe wab.exe PID 2828 wrote to memory of 848 2828 powershell.exe wab.exe PID 2828 wrote to memory of 848 2828 powershell.exe wab.exe PID 2828 wrote to memory of 848 2828 powershell.exe wab.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\76dbfa281b158a18c83d08a907f087b7330da28bdd2298eb9ee2f23c1df40491.exe"C:\Users\Admin\AppData\Local\Temp\76dbfa281b158a18c83d08a907f087b7330da28bdd2298eb9ee2f23c1df40491.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -windowstyle hidden "$Annotationerne139=cat 'C:\Users\Admin\AppData\Local\Radioactinium\bjergmassiverne\Haardest\dannelsestrinnet.Sta';$Rhinocerotiform=$Annotationerne139.substring(32760,3);.$Rhinocerotiform($Annotationerne139)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"3⤵
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Radioactinium\bjergmassiverne\Haardest\Edderduns.AmaFilesize
298KB
MD54433aa89bb2e3b2cd206c9f6ee4b88e2
SHA1889695db99aa5cf9deb29d599560c84fdeb6a56f
SHA256980b91ae25a9f486f7c303c942de6d6c25da5e5b681156ecb59ecd52b024fec7
SHA512e81e20d296a5c53328dbd19902ab279601a2ba53d1ed9c004895b2bacf92fb5ec58fd0a644da6be814cbadde9c90f4e29528de79cb8926bc27c6ec54ebd33cf0
-
C:\Users\Admin\AppData\Local\Radioactinium\bjergmassiverne\Haardest\dannelsestrinnet.StaFilesize
82KB
MD5c986903b6d507cf170e00cb73e2afe97
SHA14d54e166c2ec5e7844ae0c93c1e25dc3104ad9ef
SHA256aae5ed65a22d59635bd7451a31c91c91c7d3d9265db88bb6de3faba46e1cca30
SHA5129c0db6de2fae46d696eab9f036fd45e732cd7b8912b68448c83f0dcf0d32a4a804b965c225a849251b7200fe865f06873e894e3b1570e980fbbc73e39d21eca5
-
memory/848-26-0x0000000001A80000-0x0000000004814000-memory.dmpFilesize
45.6MB
-
memory/848-31-0x0000000000A10000-0x0000000001A72000-memory.dmpFilesize
16.4MB
-
memory/848-30-0x0000000001A80000-0x0000000004814000-memory.dmpFilesize
45.6MB
-
memory/848-28-0x0000000077D86000-0x0000000077D87000-memory.dmpFilesize
4KB
-
memory/848-29-0x0000000077D50000-0x0000000077E26000-memory.dmpFilesize
856KB
-
memory/848-27-0x0000000077B60000-0x0000000077D09000-memory.dmpFilesize
1.7MB
-
memory/2828-19-0x0000000006320000-0x00000000090B4000-memory.dmpFilesize
45.6MB
-
memory/2828-25-0x0000000006320000-0x00000000090B4000-memory.dmpFilesize
45.6MB
-
memory/2828-8-0x00000000743E0000-0x000000007498B000-memory.dmpFilesize
5.7MB
-
memory/2828-20-0x0000000006320000-0x00000000090B4000-memory.dmpFilesize
45.6MB
-
memory/2828-22-0x0000000005C90000-0x0000000005D90000-memory.dmpFilesize
1024KB
-
memory/2828-23-0x0000000077B60000-0x0000000077D09000-memory.dmpFilesize
1.7MB
-
memory/2828-24-0x0000000077D50000-0x0000000077E26000-memory.dmpFilesize
856KB
-
memory/2828-18-0x0000000002730000-0x0000000002770000-memory.dmpFilesize
256KB
-
memory/2828-17-0x00000000743E0000-0x000000007498B000-memory.dmpFilesize
5.7MB
-
memory/2828-16-0x00000000050F0000-0x00000000050F4000-memory.dmpFilesize
16KB
-
memory/2828-13-0x0000000002730000-0x0000000002770000-memory.dmpFilesize
256KB
-
memory/2828-14-0x0000000005C90000-0x0000000005D90000-memory.dmpFilesize
1024KB
-
memory/2828-9-0x00000000743E0000-0x000000007498B000-memory.dmpFilesize
5.7MB
-
memory/2828-10-0x0000000002730000-0x0000000002770000-memory.dmpFilesize
256KB
-
memory/2828-36-0x0000000006320000-0x00000000090B4000-memory.dmpFilesize
45.6MB