Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 14:27
Static task
static1
Behavioral task
behavioral1
Sample
New PO as per attached-2020-6642.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
New PO as per attached-2020-6642.exe
Resource
win10v2004-20240508-en
General
-
Target
New PO as per attached-2020-6642.exe
-
Size
44KB
-
MD5
b17644b26f54aee17d39cb7bfceee846
-
SHA1
a6b0b1155257bbaf9d710fd8d9b92b94601d82d9
-
SHA256
6f840786f7756f4b7bd84cfc327477af8a3aa99ba9768581f52a7ba3df9af806
-
SHA512
bad64051fe0604f25630515ffa703304c153752664b846f1f90e8dc0d3bd3c426ccef8b169f013ba3d49dbaf4715be39ae3a0e8ff08ea6177427b22f459eeb93
-
SSDEEP
768:mVPH8IEd7Qs5a3V4IYRaacERTW3Mst3L:mVPcIm8Ua3GI9Xtb
Malware Config
Extracted
guloader
https://onedrive.live.com/download?cid=A32AEA2B4355716B&resid=A32AEA2B4355716B%214978&authkey=AI9mqOKtOkBDroM
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Executes dropped EXE 1 IoCs
Processes:
rainmak.exepid process 3004 rainmak.exe -
Loads dropped DLL 3 IoCs
Processes:
New PO as per attached-2020-6642.exerainmak.exepid process 2188 New PO as per attached-2020-6642.exe 2188 New PO as per attached-2020-6642.exe 2744 rainmak.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
New PO as per attached-2020-6642.exerainmak.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Bolvrkercalcei2 = "C:\\Users\\Admin\\Sandsynliggres\\rainmak.vbs" New PO as per attached-2020-6642.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Bolvrkercalcei2 = "C:\\Users\\Admin\\Sandsynliggres\\rainmak.vbs" rainmak.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
New PO as per attached-2020-6642.exeNew PO as per attached-2020-6642.exerainmak.exerainmak.exepid process 2420 New PO as per attached-2020-6642.exe 2188 New PO as per attached-2020-6642.exe 3004 rainmak.exe 2744 rainmak.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
New PO as per attached-2020-6642.exerainmak.exedescription pid process target process PID 2420 set thread context of 2188 2420 New PO as per attached-2020-6642.exe New PO as per attached-2020-6642.exe PID 3004 set thread context of 2744 3004 rainmak.exe rainmak.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
New PO as per attached-2020-6642.exerainmak.exepid process 2420 New PO as per attached-2020-6642.exe 3004 rainmak.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
New PO as per attached-2020-6642.exerainmak.exepid process 2420 New PO as per attached-2020-6642.exe 3004 rainmak.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
New PO as per attached-2020-6642.exeNew PO as per attached-2020-6642.exerainmak.exedescription pid process target process PID 2420 wrote to memory of 2188 2420 New PO as per attached-2020-6642.exe New PO as per attached-2020-6642.exe PID 2420 wrote to memory of 2188 2420 New PO as per attached-2020-6642.exe New PO as per attached-2020-6642.exe PID 2420 wrote to memory of 2188 2420 New PO as per attached-2020-6642.exe New PO as per attached-2020-6642.exe PID 2420 wrote to memory of 2188 2420 New PO as per attached-2020-6642.exe New PO as per attached-2020-6642.exe PID 2420 wrote to memory of 2188 2420 New PO as per attached-2020-6642.exe New PO as per attached-2020-6642.exe PID 2188 wrote to memory of 3004 2188 New PO as per attached-2020-6642.exe rainmak.exe PID 2188 wrote to memory of 3004 2188 New PO as per attached-2020-6642.exe rainmak.exe PID 2188 wrote to memory of 3004 2188 New PO as per attached-2020-6642.exe rainmak.exe PID 2188 wrote to memory of 3004 2188 New PO as per attached-2020-6642.exe rainmak.exe PID 3004 wrote to memory of 2744 3004 rainmak.exe rainmak.exe PID 3004 wrote to memory of 2744 3004 rainmak.exe rainmak.exe PID 3004 wrote to memory of 2744 3004 rainmak.exe rainmak.exe PID 3004 wrote to memory of 2744 3004 rainmak.exe rainmak.exe PID 3004 wrote to memory of 2744 3004 rainmak.exe rainmak.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\New PO as per attached-2020-6642.exe"C:\Users\Admin\AppData\Local\Temp\New PO as per attached-2020-6642.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\New PO as per attached-2020-6642.exe"C:\Users\Admin\AppData\Local\Temp\New PO as per attached-2020-6642.exe"2⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\Sandsynliggres\rainmak.exe"C:\Users\Admin\Sandsynliggres\rainmak.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\Sandsynliggres\rainmak.exe"C:\Users\Admin\Sandsynliggres\rainmak.exe"4⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2744
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
44KB
MD5b17644b26f54aee17d39cb7bfceee846
SHA1a6b0b1155257bbaf9d710fd8d9b92b94601d82d9
SHA2566f840786f7756f4b7bd84cfc327477af8a3aa99ba9768581f52a7ba3df9af806
SHA512bad64051fe0604f25630515ffa703304c153752664b846f1f90e8dc0d3bd3c426ccef8b169f013ba3d49dbaf4715be39ae3a0e8ff08ea6177427b22f459eeb93