Analysis

  • max time kernel
    151s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/05/2024, 07:31

General

  • Target

    KEO-Order-3AY37A-APRIL_3103734_SUA721302_301824_01AU481924.exe

  • Size

    486KB

  • MD5

    e6e505189b910675d61d54ac0c6b813d

  • SHA1

    f7ab8fb65093f26dc9cbe03a694f7416b0e33347

  • SHA256

    b9b78528efaa39eda121c478cdae30464f3f3046efbf13905e29d19fbf5373b1

  • SHA512

    43309482266fdaf381b1a11c072c0f397f2826967b4d240438b67d8f80b9b1dd94a9fbe9c61723e8fd0eebd4912b51184dd372fd1c3d412346f9c42d6cda07e3

  • SSDEEP

    12288:2OLjmwzqoFl1EE+fXDRwjd4CrkOIfhoC6WzwxC3+kMZ7pH:fjmw31EEGXDKkNhoC6f4WpH

Malware Config

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\KEO-Order-3AY37A-APRIL_3103734_SUA721302_301824_01AU481924.exe
    "C:\Users\Admin\AppData\Local\Temp\KEO-Order-3AY37A-APRIL_3103734_SUA721302_301824_01AU481924.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:4728
    • C:\Users\Admin\AppData\Local\Temp\KEO-Order-3AY37A-APRIL_3103734_SUA721302_301824_01AU481924.exe
      "C:\Users\Admin\AppData\Local\Temp\KEO-Order-3AY37A-APRIL_3103734_SUA721302_301824_01AU481924.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:5028
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1268 --field-trial-handle=2280,i,4114443225282860369,4764091921472631035,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3952

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\nsm6369.tmp\BgImage.dll

      Filesize

      7KB

      MD5

      6f9797fdc4fc7fca503af580999d4682

      SHA1

      8c8e234c4646e489c29efc00f2c9a9b8aa06f55e

      SHA256

      f03f83b88cd846b9cf05116c545fbb557f4ff37ce0bb0b2bee2ff0b4bde23a81

      SHA512

      ca92c560d3718668de90806d8adbf8f23a423e82040156e9b0682d17bc567b85ffd9b14a9a824539b3d97fcc59b20ff3d8cb8ea602402153ba5128aea4604dfb

    • C:\Users\Admin\AppData\Local\Temp\nsm6369.tmp\System.dll

      Filesize

      11KB

      MD5

      b853d5d2361ade731e33e882707efc34

      SHA1

      c58b1aeabdf1cbb8334ef8797e7aceaa7a1cb6be

      SHA256

      f0cd96e0b6e40f92ad1aa0efacde833bae807b92fca19bf062c1cf8acf29484b

      SHA512

      8ea31d82ffa6f58dab5632fe72690d3a6db0be65aec85fc8a1f71626773c0974dcebefae17bcf67c4c56ef442545e985eea0b348ff6e4fc36740640092b08d69

    • memory/4728-106-0x0000000005220000-0x0000000007EE2000-memory.dmp

      Filesize

      44.8MB

    • memory/4728-107-0x0000000005220000-0x0000000007EE2000-memory.dmp

      Filesize

      44.8MB

    • memory/4728-108-0x0000000077551000-0x0000000077671000-memory.dmp

      Filesize

      1.1MB

    • memory/4728-109-0x0000000010004000-0x0000000010005000-memory.dmp

      Filesize

      4KB

    • memory/4728-117-0x0000000005220000-0x0000000007EE2000-memory.dmp

      Filesize

      44.8MB

    • memory/5028-110-0x00000000016E0000-0x00000000043A2000-memory.dmp

      Filesize

      44.8MB

    • memory/5028-112-0x00000000016E0000-0x00000000043A2000-memory.dmp

      Filesize

      44.8MB

    • memory/5028-113-0x0000000000480000-0x00000000016D4000-memory.dmp

      Filesize

      18.3MB