Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/05/2024, 07:38

General

  • Target

    Cumacean.exe

  • Size

    234KB

  • MD5

    d9ad627096015371e1d4db92375bc6ff

  • SHA1

    c625bbef9ca680e05e6d426ef1417086d059cd94

  • SHA256

    1f7f8fa2a0d1850a1753edd61fc2ddfd67031a15b65929469c044dc8c751de03

  • SHA512

    9573885810921efacaa924e48069cd04adbc0f1003a94318734233a570c495d91f6e1dc6ab02e078ebd17cdceb1a616636f6799dc737aae281e9cd4681df6aa3

  • SSDEEP

    6144:Ek62PBHbekcwi+GGKPNYLsJbRGryWCP3fI/C:BpaGgvfRRGrK4a

Score
10/10

Malware Config

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Cumacean.exe
    "C:\Users\Admin\AppData\Local\Temp\Cumacean.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:3740
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe
      "C:\Users\Admin\AppData\Local\Temp\Cumacean.exe"
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:1120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsb3CBC.tmp\System.dll

    Filesize

    11KB

    MD5

    55f18cafe28167995629fdeae4f07bdf

    SHA1

    a6bd9310f4408c86149993d1e8833d35dd16bb23

    SHA256

    e32b35cde7c6e2c967445de92884684db7fda506ea52b9aaa74c1a33dd2fdfe6

    SHA512

    113e7a9e1958bea6a045a7120adf6c667880b9b1d90ff7790e2004f3954f9358a5e44ceb6be0c3b32ff8e6a06878a0f22be7206d0b5a6c5392ca30b8c3bff8ce

  • C:\Users\Admin\AppData\Local\Temp\nsb3CBC.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    f294cfefcf2f306696944427ef551de5

    SHA1

    6ae91bc7706e0dc0e882f2648277ffc9437a5f8b

    SHA256

    b170d492cedc29719d27092c29ae1c71bc0b4d9c7df5707b44ac748bc394967f

    SHA512

    da8b57a3b9256aa6f5e8a33399eea9fb154f9463dfcb297b67419f540049cca9450ce81fe5d3dffad3d8708f300c9453d64add8e81e8dd48b6bae0f1053f116e

  • memory/1120-21-0x0000000000F00000-0x0000000002F0C000-memory.dmp

    Filesize

    32.0MB

  • memory/1120-23-0x0000000072C30000-0x0000000073E84000-memory.dmp

    Filesize

    18.3MB

  • memory/1120-25-0x0000000000F00000-0x0000000002F0C000-memory.dmp

    Filesize

    32.0MB

  • memory/3740-18-0x0000000005660000-0x000000000766C000-memory.dmp

    Filesize

    32.0MB

  • memory/3740-19-0x00000000777A1000-0x00000000778C1000-memory.dmp

    Filesize

    1.1MB

  • memory/3740-20-0x0000000073E95000-0x0000000073E96000-memory.dmp

    Filesize

    4KB

  • memory/3740-22-0x0000000005660000-0x000000000766C000-memory.dmp

    Filesize

    32.0MB