Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 14:27
Static task
static1
Behavioral task
behavioral1
Sample
New PO as per attached-2020-6642.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
New PO as per attached-2020-6642.exe
Resource
win10v2004-20240508-en
General
-
Target
New PO as per attached-2020-6642.exe
-
Size
44KB
-
MD5
b17644b26f54aee17d39cb7bfceee846
-
SHA1
a6b0b1155257bbaf9d710fd8d9b92b94601d82d9
-
SHA256
6f840786f7756f4b7bd84cfc327477af8a3aa99ba9768581f52a7ba3df9af806
-
SHA512
bad64051fe0604f25630515ffa703304c153752664b846f1f90e8dc0d3bd3c426ccef8b169f013ba3d49dbaf4715be39ae3a0e8ff08ea6177427b22f459eeb93
-
SSDEEP
768:mVPH8IEd7Qs5a3V4IYRaacERTW3Mst3L:mVPcIm8Ua3GI9Xtb
Malware Config
Extracted
guloader
https://onedrive.live.com/download?cid=A32AEA2B4355716B&resid=A32AEA2B4355716B%214978&authkey=AI9mqOKtOkBDroM
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
New PO as per attached-2020-6642.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation New PO as per attached-2020-6642.exe -
Executes dropped EXE 1 IoCs
Processes:
rainmak.exepid process 2428 rainmak.exe -
Loads dropped DLL 1 IoCs
Processes:
rainmak.exepid process 3868 rainmak.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
New PO as per attached-2020-6642.exerainmak.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Bolvrkercalcei2 = "C:\\Users\\Admin\\Sandsynliggres\\rainmak.vbs" New PO as per attached-2020-6642.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Bolvrkercalcei2 = "C:\\Users\\Admin\\Sandsynliggres\\rainmak.vbs" rainmak.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
New PO as per attached-2020-6642.exeNew PO as per attached-2020-6642.exerainmak.exerainmak.exepid process 2864 New PO as per attached-2020-6642.exe 616 New PO as per attached-2020-6642.exe 2428 rainmak.exe 3868 rainmak.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
New PO as per attached-2020-6642.exerainmak.exedescription pid process target process PID 2864 set thread context of 616 2864 New PO as per attached-2020-6642.exe New PO as per attached-2020-6642.exe PID 2428 set thread context of 3868 2428 rainmak.exe rainmak.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
New PO as per attached-2020-6642.exerainmak.exepid process 2864 New PO as per attached-2020-6642.exe 2428 rainmak.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
New PO as per attached-2020-6642.exerainmak.exepid process 2864 New PO as per attached-2020-6642.exe 2428 rainmak.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
New PO as per attached-2020-6642.exeNew PO as per attached-2020-6642.exerainmak.exedescription pid process target process PID 2864 wrote to memory of 616 2864 New PO as per attached-2020-6642.exe New PO as per attached-2020-6642.exe PID 2864 wrote to memory of 616 2864 New PO as per attached-2020-6642.exe New PO as per attached-2020-6642.exe PID 2864 wrote to memory of 616 2864 New PO as per attached-2020-6642.exe New PO as per attached-2020-6642.exe PID 2864 wrote to memory of 616 2864 New PO as per attached-2020-6642.exe New PO as per attached-2020-6642.exe PID 616 wrote to memory of 2428 616 New PO as per attached-2020-6642.exe rainmak.exe PID 616 wrote to memory of 2428 616 New PO as per attached-2020-6642.exe rainmak.exe PID 616 wrote to memory of 2428 616 New PO as per attached-2020-6642.exe rainmak.exe PID 2428 wrote to memory of 3868 2428 rainmak.exe rainmak.exe PID 2428 wrote to memory of 3868 2428 rainmak.exe rainmak.exe PID 2428 wrote to memory of 3868 2428 rainmak.exe rainmak.exe PID 2428 wrote to memory of 3868 2428 rainmak.exe rainmak.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\New PO as per attached-2020-6642.exe"C:\Users\Admin\AppData\Local\Temp\New PO as per attached-2020-6642.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\New PO as per attached-2020-6642.exe"C:\Users\Admin\AppData\Local\Temp\New PO as per attached-2020-6642.exe"2⤵
- Checks computer location settings
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Users\Admin\Sandsynliggres\rainmak.exe"C:\Users\Admin\Sandsynliggres\rainmak.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\Sandsynliggres\rainmak.exe"C:\Users\Admin\Sandsynliggres\rainmak.exe"4⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3868
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5b17644b26f54aee17d39cb7bfceee846
SHA1a6b0b1155257bbaf9d710fd8d9b92b94601d82d9
SHA2566f840786f7756f4b7bd84cfc327477af8a3aa99ba9768581f52a7ba3df9af806
SHA512bad64051fe0604f25630515ffa703304c153752664b846f1f90e8dc0d3bd3c426ccef8b169f013ba3d49dbaf4715be39ae3a0e8ff08ea6177427b22f459eeb93