Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2024, 01:07
Static task
static1
Behavioral task
behavioral1
Sample
00db1acc412cdb3aa45f4d55c18785ae9e8c8d7d2dcfacd8306d1f79a5c20a8c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
00db1acc412cdb3aa45f4d55c18785ae9e8c8d7d2dcfacd8306d1f79a5c20a8c.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
Retshandlingerne29.ps1
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
Retshandlingerne29.ps1
Resource
win10v2004-20240419-en
General
-
Target
00db1acc412cdb3aa45f4d55c18785ae9e8c8d7d2dcfacd8306d1f79a5c20a8c.exe
-
Size
391KB
-
MD5
1e7b3c55e65b93ed3750462bd4e8d58b
-
SHA1
abec5b9ca7157ab21fb9a5e72ef01f0a15f11a51
-
SHA256
00db1acc412cdb3aa45f4d55c18785ae9e8c8d7d2dcfacd8306d1f79a5c20a8c
-
SHA512
b75f4bc04c0ec6c0cc49c06a3290c2bfe53eabb9c530660d295d58273636c512613cf9ebd5246dcd1848f155a51f14eaa7c7dc26ce59a97721d5afecdb69ca2a
-
SSDEEP
12288:HTg5hqq7yL3B2MWy45NDr6K8AVBQ//pR8iQXL:HTg7qdLxn45pJrVBQnnBQXL
Malware Config
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Startup key = "%Udmark% -windowstyle minimized $Boblekamre=(Get-ItemProperty -Path 'HKCU:\\Halvfemsaarsfdselsdages\\').Milkwood;%Udmark% ($Boblekamre)" reg.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3276 powershell.exe 5056 wab.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3276 set thread context of 5056 3276 powershell.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 3908 reg.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 3276 powershell.exe 3276 powershell.exe 3276 powershell.exe 3276 powershell.exe 3276 powershell.exe 3276 powershell.exe 3276 powershell.exe 3276 powershell.exe 3276 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3276 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3276 powershell.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4080 wrote to memory of 3276 4080 00db1acc412cdb3aa45f4d55c18785ae9e8c8d7d2dcfacd8306d1f79a5c20a8c.exe 83 PID 4080 wrote to memory of 3276 4080 00db1acc412cdb3aa45f4d55c18785ae9e8c8d7d2dcfacd8306d1f79a5c20a8c.exe 83 PID 4080 wrote to memory of 3276 4080 00db1acc412cdb3aa45f4d55c18785ae9e8c8d7d2dcfacd8306d1f79a5c20a8c.exe 83 PID 3276 wrote to memory of 2760 3276 powershell.exe 88 PID 3276 wrote to memory of 2760 3276 powershell.exe 88 PID 3276 wrote to memory of 2760 3276 powershell.exe 88 PID 3276 wrote to memory of 5056 3276 powershell.exe 90 PID 3276 wrote to memory of 5056 3276 powershell.exe 90 PID 3276 wrote to memory of 5056 3276 powershell.exe 90 PID 3276 wrote to memory of 5056 3276 powershell.exe 90 PID 3276 wrote to memory of 5056 3276 powershell.exe 90 PID 5056 wrote to memory of 5108 5056 wab.exe 91 PID 5056 wrote to memory of 5108 5056 wab.exe 91 PID 5056 wrote to memory of 5108 5056 wab.exe 91 PID 5108 wrote to memory of 3908 5108 cmd.exe 93 PID 5108 wrote to memory of 3908 5108 cmd.exe 93 PID 5108 wrote to memory of 3908 5108 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\00db1acc412cdb3aa45f4d55c18785ae9e8c8d7d2dcfacd8306d1f79a5c20a8c.exe"C:\Users\Admin\AppData\Local\Temp\00db1acc412cdb3aa45f4d55c18785ae9e8c8d7d2dcfacd8306d1f79a5c20a8c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Dimissorernes=Get-Content 'C:\Users\Admin\AppData\Local\tjurhane\fasciolidae\stinksvampen\Retshandlingerne29.Dat';$Skoletandlges=$Dimissorernes.SubString(59193,3);.$Skoletandlges($Dimissorernes)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"3⤵PID:2760
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Udmark% -windowstyle minimized $Boblekamre=(Get-ItemProperty -Path 'HKCU:\Halvfemsaarsfdselsdages\').Milkwood;%Udmark% ($Boblekamre)"4⤵
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Udmark% -windowstyle minimized $Boblekamre=(Get-ItemProperty -Path 'HKCU:\Halvfemsaarsfdselsdages\').Milkwood;%Udmark% ($Boblekamre)"5⤵
- Adds Run key to start application
- Modifies registry key
PID:3908
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
328KB
MD591f9880b33408373db6257b678a4a0bf
SHA1912a4ec00cac46c0b15d53d539039a77137bd86e
SHA25612b35dc28be02873ee8b345ac4a38eeda408aa7505a2f836aa32e3467d939008
SHA512b6747b3d21b8b1e91d212863a2969f1b20b18c4686e71df6fec7d96ff05b74470cd7c063ad7fa47dca467e5e462476feb13b9ddeedfb370283b0fc11a8af454e
-
Filesize
57KB
MD56db11b1548b28a3b9b2b3e3147cddc04
SHA17f62e36b96a2d2264a21e98b17cbb6b0710f4335
SHA256af7a18872951b3eef11a71013231b42a2ef418191580cd16505cb8bd4dae8cde
SHA5127e77a496ea3b44479a20a0e9edfd61fcd322ee6365cda15ab908228b936a6219e6fd3162277e46127e532dc51a95b77cf43506caa60060c426510b9721a531dd