Malware Analysis Report

2024-10-18 23:09

Sample ID 240522-c5nr9shf93
Target f611a512d65053f68baee97be8cbda5e0539fe061032466a1937c9a1659c2791.img
SHA256 f611a512d65053f68baee97be8cbda5e0539fe061032466a1937c9a1659c2791
Tags
guloader downloader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

f611a512d65053f68baee97be8cbda5e0539fe061032466a1937c9a1659c2791

Threat Level: Known bad

The file f611a512d65053f68baee97be8cbda5e0539fe061032466a1937c9a1659c2791.img was found to be: Known bad.

Malicious Activity Summary

guloader downloader

Guloader,Cloudeye

Loads dropped DLL

Suspicious use of NtSetInformationThreadHideFromDebugger

Suspicious use of SetThreadContext

Drops file in System32 directory

Drops file in Program Files directory

Enumerates physical storage devices

Program crash

Unsigned PE

Suspicious behavior: MapViewOfSection

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-22 02:39

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-22 02:39

Reported

2024-05-22 02:42

Platform

win7-20240221-en

Max time kernel

150s

Max time network

154s

Command Line

"C:\Users\Admin\AppData\Local\Temp\SCAN.AWB.exe"

Signatures

Guloader,Cloudeye

downloader guloader

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\SCAN.AWB.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\SCAN.AWB.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\kaleb.ini C:\Users\Admin\AppData\Local\Temp\SCAN.AWB.exe N/A

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\SCAN.AWB.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\SCAN.AWB.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1100 set thread context of 2392 N/A C:\Users\Admin\AppData\Local\Temp\SCAN.AWB.exe C:\Users\Admin\AppData\Local\Temp\SCAN.AWB.exe

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\skitserer.ini C:\Users\Admin\AppData\Local\Temp\SCAN.AWB.exe N/A

Enumerates physical storage devices

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\SCAN.AWB.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\SCAN.AWB.exe

"C:\Users\Admin\AppData\Local\Temp\SCAN.AWB.exe"

C:\Users\Admin\AppData\Local\Temp\SCAN.AWB.exe

"C:\Users\Admin\AppData\Local\Temp\SCAN.AWB.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 magnocomx.ru.com udp

Files

C:\Windows\SysWOW64\kaleb.ini

MD5 9dfd97e7025bf54441fe6759f87e5ddf
SHA1 0f04ae6a7bc2213255fc72898f339b12bd743f24
SHA256 eea1bdc93e5a8fcbca0aea236d83b487ad2af028095a0d0107f02d397b4372fb
SHA512 08ea09b23814906f040060b46d919d45f6aee0c96b27d0baa88813bc46032c274546adb89e354b78f659c962a8588adbbd49966951e1f1b097e2484a07678f44

\Users\Admin\AppData\Local\Temp\nsjA92D.tmp\System.dll

MD5 8b3830b9dbf87f84ddd3b26645fed3a0
SHA1 223bef1f19e644a610a0877d01eadc9e28299509
SHA256 f004c568d305cd95edbd704166fcd2849d395b595dff814bcc2012693527ac37
SHA512 d13cfd98db5ca8dc9c15723eee0e7454975078a776bce26247228be4603a0217e166058ebadc68090afe988862b7514cb8cb84de13b3de35737412a6f0a8ac03

C:\Users\Admin\AppData\Local\Temp\nstB2DF.tmp

MD5 8ce4b16b22b58894aa86c421e8759df3
SHA1 13fbd79c3d390e5d6585a21e11ff5ec1970cff0c
SHA256 8254c329a92850f6d539dd376f4816ee2764517da5e0235514af433164480d7a
SHA512 2af8a9104b3f64ed640d8c7e298d2d480f03a3610cbc2b33474321ec59024a48592ea8545e41e09d5d1108759df48ede0054f225df39d4f0f312450e0aa9dd25

C:\Users\Admin\AppData\Local\Temp\nstB2DF.tmp

MD5 25bc6654798eb508fa0b6343212a74fe
SHA1 15d5e1d3b948fd5986aaff7d9419b5e52c75fc93
SHA256 8e5202705183bd3a20a29e224499b0f77a8273ee33cd93cca71043c57ad4bdfc
SHA512 5868c6241ed3cfcc5c34bfe42e4b9f5c69e74975e524771d8c9f35cafc13fd01cd943ec4d8caefee79a1f4a457e69d20b7a86f88db83a5bc3e6bd8a619972898

C:\Users\Admin\AppData\Local\Temp\nstB2DF.tmp

MD5 4e27f2226785e9abbe046fc592668860
SHA1 28b18a7f383131df509f7191f946a32c5a2e410c
SHA256 01a219245e1501fee01ce0baea8f6065ce5162cea12fa570689a07c9717be81d
SHA512 2a23585835bdb5db8175cab265566042282841efdcee8aaba8b9b5d466b0f165c0c5973033ce94bb9a8f07a956689247981ea07ac5a51408263e1653d9710adb

C:\Users\Admin\AppData\Local\Temp\nstB2DF.tmp

MD5 cde63b34c142af0a38cbe83791c964f8
SHA1 ece2b194b486118b40ad12c1f0e9425dd0672424
SHA256 65e2d70166c9a802b7ad2a87129b8945f083e5f268878790a9d1f1c03f47938d
SHA512 0559d3d34ad64ccc27e685431c24fc6ead0f645db14fa0e125a64fb67dbd158c15432c1fc5407811aac8a3486090dfbcfcbc3c6bf5aa0ec73f979ef62d14853c

C:\Users\Admin\AppData\Local\Temp\nstB2DF.tmp

MD5 e2fecc970546c3418917879fe354826c
SHA1 63f1c1dd01b87704a6b6c99fd9f141e0a3064f16
SHA256 ff91566d755f5d038ae698a2cc0a7d4d14e5273afafc37b6f03afda163768fa0
SHA512 3c4a68cbaee94f986515f43305a0e7620c14c30213d4a17db4a3e8a1b996764eb688bf733f472fc52073c2c80bb5229bb29411d7601aefe1c4370e230c341a0a

C:\Users\Admin\AppData\Local\Temp\nstB2DF.tmp

MD5 50484c19f1afdaf3841a0d821ed393d2
SHA1 c65a0fb7e74ffd2c9fc3a0f9aacb0f6a24b0a68b
SHA256 6923dd1bc0460082c5d55a831908c24a282860b7f1cd6c2b79cf1bc8857c639c
SHA512 d51a20d67571fe70bcd6c36e1382a3c342f42671c710090b75fcfc2405ce24488e03a7131eefe4751d0bd3aeaad816605ad10c8e3258d72fcf379e32416cbf3b

C:\Users\Admin\AppData\Local\Temp\nstB2DF.tmp

MD5 67cfa7364c4cf265b047d87ff2e673ae
SHA1 56e27889277981a9b63fcf5b218744a125bbc2fa
SHA256 639b68bd180b47d542dd001d03557ee2d5b3065c3c783143bc9fb548f3fd7713
SHA512 17f28a136b20b89e9c3a418b08fd8e6fcaac960872dc33b2481af2d872efc44228f420759c57724f5d953c7ba98f2283e2acc7dfe5a58cbf719c6480ec7a648b

C:\Users\Admin\AppData\Local\Temp\nstB2DF.tmp

MD5 c3cb69218b85c3260387fb582cb518dd
SHA1 961c892ded09a4cbb5392097bb845ccba65902ad
SHA256 1c329924865741e0222d3ead23072cfbed14f96e2b0432573068eb0640513101
SHA512 2402fffeb89c531db742bf6f5466eee8fe13edf97b8ecfc2cace3522806b322924d1ca81dda25e59b4047b8f40ad11ae9216e0a0d5c7fc6beef4368eb9551422

C:\Users\Admin\AppData\Local\Temp\nstB2DF.tmp

MD5 2b3884fe02299c565e1c37ee7ef99293
SHA1 d8e2ef2a52083f6df210109fea53860ea227af9c
SHA256 ae789a65914ed002efb82dad89e5a4d4b9ec8e7faae30d0ed6e3c0d20f7d3858
SHA512 aeb9374a52d0ad99336bfd4ec7bb7c5437b827845b8784d9c21f7d96a931693604689f6adc3ca25fad132a0ad6123013211ff550f427fa86e4f26c122ac6a0fe

C:\Users\Admin\AppData\Local\Temp\nstB2DF.tmp

MD5 9a53fc1d7126c5e7c81bb5c15b15537b
SHA1 e2d13e0fa37de4c98f30c728210d6afafbb2b000
SHA256 a7de06c22e4e67908840ec3f00ab8fe9e04ae94fb16a74136002afbaf607ff92
SHA512 b0bffbb8072dbdcfc68f0e632f727c08fe3ef936b2ef332c08486553ff2cef7b0bcdb400e421a117e977bb0fac17ce4706a8097e32d558a918433646b6d5f1a1

C:\Users\Admin\AppData\Local\Temp\nsdBA6F.tmp

MD5 3bb6070b3e4cbc844c6cee699666f746
SHA1 eaeb87f3175746d3c8a0896e35f5f2d3ad4f2d7b
SHA256 8678054a5a992d44bb69e4ab770e4d17cd1530511f044754ba3a15e59121cba4
SHA512 cf53f306a00ef5ed498c1dcaa426b013a64520938f492d77cd0f1cc15dffe37d465f30b9e15d451e1f85ed8e67f2ebed0930302ddb94b2f7172dd9e4fd6c52f7

memory/1100-841-0x0000000003130000-0x0000000004365000-memory.dmp

memory/1100-842-0x0000000077501000-0x0000000077602000-memory.dmp

memory/1100-843-0x0000000003130000-0x0000000004365000-memory.dmp

memory/1100-844-0x0000000077500000-0x00000000776A9000-memory.dmp

memory/2392-845-0x0000000077500000-0x00000000776A9000-memory.dmp

memory/2392-846-0x0000000000490000-0x00000000014F2000-memory.dmp

memory/1100-851-0x0000000003130000-0x0000000004365000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-22 02:39

Reported

2024-05-22 02:42

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\SCAN.AWB.exe"

Signatures

Guloader,Cloudeye

downloader guloader

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\SCAN.AWB.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\SCAN.AWB.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\kaleb.ini C:\Users\Admin\AppData\Local\Temp\SCAN.AWB.exe N/A

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\SCAN.AWB.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\SCAN.AWB.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 5116 set thread context of 5084 N/A C:\Users\Admin\AppData\Local\Temp\SCAN.AWB.exe C:\Users\Admin\AppData\Local\Temp\SCAN.AWB.exe

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\skitserer.ini C:\Users\Admin\AppData\Local\Temp\SCAN.AWB.exe N/A

Enumerates physical storage devices

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\SCAN.AWB.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\SCAN.AWB.exe

"C:\Users\Admin\AppData\Local\Temp\SCAN.AWB.exe"

C:\Users\Admin\AppData\Local\Temp\SCAN.AWB.exe

"C:\Users\Admin\AppData\Local\Temp\SCAN.AWB.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 82.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 69.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 magnocomx.ru.com udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 magnocomx.ru.com udp
US 8.8.8.8:53 magnocomx.ru.com udp
US 8.8.8.8:53 magnocomx.ru.com udp
US 8.8.8.8:53 magnocomx.ru.com udp
US 8.8.8.8:53 magnocomx.ru.com udp
US 8.8.8.8:53 magnocomx.ru.com udp
US 8.8.8.8:53 91.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 magnocomx.ru.com udp
US 8.8.8.8:53 magnocomx.ru.com udp
US 8.8.8.8:53 magnocomx.ru.com udp
US 8.8.8.8:53 magnocomx.ru.com udp
US 8.8.8.8:53 magnocomx.ru.com udp
US 8.8.8.8:53 magnocomx.ru.com udp
US 8.8.8.8:53 30.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 magnocomx.ru.com udp
US 8.8.8.8:53 magnocomx.ru.com udp
US 8.8.8.8:53 magnocomx.ru.com udp
US 8.8.8.8:53 magnocomx.ru.com udp
US 8.8.8.8:53 magnocomx.ru.com udp
US 8.8.8.8:53 magnocomx.ru.com udp
US 8.8.8.8:53 magnocomx.ru.com udp
US 8.8.8.8:53 magnocomx.ru.com udp
US 8.8.8.8:53 magnocomx.ru.com udp
US 8.8.8.8:53 magnocomx.ru.com udp
US 8.8.8.8:53 magnocomx.ru.com udp
US 8.8.8.8:53 magnocomx.ru.com udp
US 8.8.8.8:53 84.65.42.20.in-addr.arpa udp

Files

C:\Windows\SysWOW64\kaleb.ini

MD5 9dfd97e7025bf54441fe6759f87e5ddf
SHA1 0f04ae6a7bc2213255fc72898f339b12bd743f24
SHA256 eea1bdc93e5a8fcbca0aea236d83b487ad2af028095a0d0107f02d397b4372fb
SHA512 08ea09b23814906f040060b46d919d45f6aee0c96b27d0baa88813bc46032c274546adb89e354b78f659c962a8588adbbd49966951e1f1b097e2484a07678f44

C:\Users\Admin\AppData\Local\Temp\nsj5219.tmp\System.dll

MD5 8b3830b9dbf87f84ddd3b26645fed3a0
SHA1 223bef1f19e644a610a0877d01eadc9e28299509
SHA256 f004c568d305cd95edbd704166fcd2849d395b595dff814bcc2012693527ac37
SHA512 d13cfd98db5ca8dc9c15723eee0e7454975078a776bce26247228be4603a0217e166058ebadc68090afe988862b7514cb8cb84de13b3de35737412a6f0a8ac03

C:\Users\Admin\AppData\Local\Temp\nsv547C.tmp

MD5 e2fecc970546c3418917879fe354826c
SHA1 63f1c1dd01b87704a6b6c99fd9f141e0a3064f16
SHA256 ff91566d755f5d038ae698a2cc0a7d4d14e5273afafc37b6f03afda163768fa0
SHA512 3c4a68cbaee94f986515f43305a0e7620c14c30213d4a17db4a3e8a1b996764eb688bf733f472fc52073c2c80bb5229bb29411d7601aefe1c4370e230c341a0a

C:\Users\Admin\AppData\Local\Temp\nsv547C.tmp

MD5 baf2a3b161f59f08e4ac15360a33f91e
SHA1 7720d461221d6947de0c8295c9a350de7793e0e2
SHA256 8c876ae7916572fa02c0c9841d47358f549363bda4f2879944e44c250f29e431
SHA512 b9ff3c4e06b93e7896a44bbcc4f228e6bed9afc14d4996bb5953851157773882d576826df5d1b9b2000356d69c3a43a61186f88027c4c9914e7aca8a93aa357f

C:\Users\Admin\AppData\Local\Temp\nsv5603.tmp

MD5 25bc6654798eb508fa0b6343212a74fe
SHA1 15d5e1d3b948fd5986aaff7d9419b5e52c75fc93
SHA256 8e5202705183bd3a20a29e224499b0f77a8273ee33cd93cca71043c57ad4bdfc
SHA512 5868c6241ed3cfcc5c34bfe42e4b9f5c69e74975e524771d8c9f35cafc13fd01cd943ec4d8caefee79a1f4a457e69d20b7a86f88db83a5bc3e6bd8a619972898

C:\Users\Admin\AppData\Local\Temp\nsv5603.tmp

MD5 8ce4b16b22b58894aa86c421e8759df3
SHA1 13fbd79c3d390e5d6585a21e11ff5ec1970cff0c
SHA256 8254c329a92850f6d539dd376f4816ee2764517da5e0235514af433164480d7a
SHA512 2af8a9104b3f64ed640d8c7e298d2d480f03a3610cbc2b33474321ec59024a48592ea8545e41e09d5d1108759df48ede0054f225df39d4f0f312450e0aa9dd25

C:\Users\Admin\AppData\Local\Temp\nsv5603.tmp

MD5 cde63b34c142af0a38cbe83791c964f8
SHA1 ece2b194b486118b40ad12c1f0e9425dd0672424
SHA256 65e2d70166c9a802b7ad2a87129b8945f083e5f268878790a9d1f1c03f47938d
SHA512 0559d3d34ad64ccc27e685431c24fc6ead0f645db14fa0e125a64fb67dbd158c15432c1fc5407811aac8a3486090dfbcfcbc3c6bf5aa0ec73f979ef62d14853c

C:\Users\Admin\AppData\Local\Temp\nsv5603.tmp

MD5 50484c19f1afdaf3841a0d821ed393d2
SHA1 c65a0fb7e74ffd2c9fc3a0f9aacb0f6a24b0a68b
SHA256 6923dd1bc0460082c5d55a831908c24a282860b7f1cd6c2b79cf1bc8857c639c
SHA512 d51a20d67571fe70bcd6c36e1382a3c342f42671c710090b75fcfc2405ce24488e03a7131eefe4751d0bd3aeaad816605ad10c8e3258d72fcf379e32416cbf3b

C:\Users\Admin\AppData\Local\Temp\nsv5603.tmp

MD5 67cfa7364c4cf265b047d87ff2e673ae
SHA1 56e27889277981a9b63fcf5b218744a125bbc2fa
SHA256 639b68bd180b47d542dd001d03557ee2d5b3065c3c783143bc9fb548f3fd7713
SHA512 17f28a136b20b89e9c3a418b08fd8e6fcaac960872dc33b2481af2d872efc44228f420759c57724f5d953c7ba98f2283e2acc7dfe5a58cbf719c6480ec7a648b

C:\Users\Admin\AppData\Local\Temp\nsv5603.tmp

MD5 c3cb69218b85c3260387fb582cb518dd
SHA1 961c892ded09a4cbb5392097bb845ccba65902ad
SHA256 1c329924865741e0222d3ead23072cfbed14f96e2b0432573068eb0640513101
SHA512 2402fffeb89c531db742bf6f5466eee8fe13edf97b8ecfc2cace3522806b322924d1ca81dda25e59b4047b8f40ad11ae9216e0a0d5c7fc6beef4368eb9551422

C:\Users\Admin\AppData\Local\Temp\nsv5603.tmp

MD5 2b3884fe02299c565e1c37ee7ef99293
SHA1 d8e2ef2a52083f6df210109fea53860ea227af9c
SHA256 ae789a65914ed002efb82dad89e5a4d4b9ec8e7faae30d0ed6e3c0d20f7d3858
SHA512 aeb9374a52d0ad99336bfd4ec7bb7c5437b827845b8784d9c21f7d96a931693604689f6adc3ca25fad132a0ad6123013211ff550f427fa86e4f26c122ac6a0fe

C:\Users\Admin\AppData\Local\Temp\nsv5603.tmp

MD5 9a53fc1d7126c5e7c81bb5c15b15537b
SHA1 e2d13e0fa37de4c98f30c728210d6afafbb2b000
SHA256 a7de06c22e4e67908840ec3f00ab8fe9e04ae94fb16a74136002afbaf607ff92
SHA512 b0bffbb8072dbdcfc68f0e632f727c08fe3ef936b2ef332c08486553ff2cef7b0bcdb400e421a117e977bb0fac17ce4706a8097e32d558a918433646b6d5f1a1

C:\Users\Admin\AppData\Local\Temp\nsv5603.tmp

MD5 cc98cdbdb6e4571f9dbef3d7ef0cecb6
SHA1 0c6c945dacb7dc9269bb8659e61b6bd44e03b5f4
SHA256 fdd17f70c2c855ed3b81bf41d2dbff3a0d85a7f7b019f04c569f897188e0d3b3
SHA512 83a41e73d62f77faf633e3fc5fb4f0ee4984881dc7ed5bbfcd73be815c89a606349cb0adf5de1552cfd0ca0ff3d7bd9c2332658586e582158e53777e2fcfba4c

C:\Users\Admin\AppData\Local\Temp\nsv5603.tmp

MD5 5b2357aa9ee8d93ebc8fea2a7da01fda
SHA1 3a5bb5ceeeb26ee649ce9c8fa1c47e45d8c8f00a
SHA256 f2b723416cc41c59b870a8fbbe8ecab3cd0cf2298902649a50668b1b88e6e835
SHA512 03d9cbca3d09de197530779f90b8864da4a34aa50a7dc87fdd964ac53a5a6a73f543fe5727fc2df29b9cf5b3646b1ffc60b90883148c1989fdbcee5658582fe2

C:\Users\Admin\AppData\Local\Temp\nsw573D.tmp

MD5 4e27f2226785e9abbe046fc592668860
SHA1 28b18a7f383131df509f7191f946a32c5a2e410c
SHA256 01a219245e1501fee01ce0baea8f6065ce5162cea12fa570689a07c9717be81d
SHA512 2a23585835bdb5db8175cab265566042282841efdcee8aaba8b9b5d466b0f165c0c5973033ce94bb9a8f07a956689247981ea07ac5a51408263e1653d9710adb

C:\Users\Admin\AppData\Local\Temp\nsw573D.tmp

MD5 536389bbf053b80ce24ccb866d88062d
SHA1 6b73170d96a856ed910dad0c6da873ef30f90396
SHA256 43cb47f4df5b0c44fda22501a37e5ea542847cb48c2e184e10d47dd20900c2e4
SHA512 6d86692b95765720e371e1c026eeaa8adcb4a166c733a172d6a578b67e9cf604c12a907ea927e494463c6102a40262a1f0b4059c62b330110d64f4c5b8208a29

C:\Users\Admin\AppData\Local\Temp\nsw573D.tmp

MD5 3aa458e09952c53911fc1aee91d1012e
SHA1 7bfec4be6d078d412b0d13081df5ed1c27a81d4a
SHA256 02298d328a3bc400fd2be620c68b0939f942d7892dcf728d775d84045d6ca3a0
SHA512 24cf910fe4bc4ab76eed201b0d486e30df3bfc6bee7aff371cfa2228ee894c9b5d810b59b26ff764d5e02c535bc0afc26192105cf39c0c04e60ef0b48f12dcea

C:\Users\Admin\AppData\Local\Temp\nsw573D.tmp

MD5 0a6bb72ae3e4b40d6d35c7a295e5a937
SHA1 7bfd6af094f0e04cd0588032df20b24187a6bfdc
SHA256 d949e20ea77446002ad4be6cfd57393308d484152b9c242f2d336266e3f956ee
SHA512 1fe7aa39b17479da5b8f15d85e0e4c12bca81c40fc6c6eb961aca7f189fd51479f150b8657a06903fe7ef00c4314faa2bf4a87cfc2f1b1aad5f8b06524211590

C:\Users\Admin\AppData\Local\Temp\nsw573D.tmp

MD5 a70d3de7e0467b4e21bf45b8d6b51047
SHA1 3f10b1be001a1e0bffcf3d9fca063dc1cd467a61
SHA256 4ce3e053ca9221026c2f55e272e6c8ef749bddd118753ab18a33dbd5029e18b9
SHA512 378a780f31e8e104bcb2d57ee8966080475ef8c020fb7c2b1014b879e689dc79abd351e3e8f7e172cde528672b890aa187c30758ccb2b4a816519cc73bd38d35

memory/5116-839-0x00000000041E0000-0x0000000005415000-memory.dmp

memory/5116-840-0x0000000077B41000-0x0000000077C61000-memory.dmp

memory/5116-841-0x0000000010004000-0x0000000010005000-memory.dmp

memory/5084-842-0x00000000016F0000-0x0000000002925000-memory.dmp

memory/5116-843-0x00000000041E0000-0x0000000005415000-memory.dmp

memory/5084-844-0x0000000077BC8000-0x0000000077BC9000-memory.dmp

memory/5084-845-0x0000000000490000-0x00000000016E4000-memory.dmp

memory/5084-847-0x00000000016F0000-0x0000000002925000-memory.dmp

memory/5084-848-0x0000000077B41000-0x0000000077C61000-memory.dmp

memory/5116-853-0x00000000041E0000-0x0000000005415000-memory.dmp

Analysis: behavioral3

Detonation Overview

Submitted

2024-05-22 02:39

Reported

2024-05-22 02:42

Platform

win7-20240221-en

Max time kernel

120s

Max time network

125s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

Signatures

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1556 -s 228

Network

N/A

Files

N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-05-22 02:39

Reported

2024-05-22 02:42

Platform

win10v2004-20240508-en

Max time kernel

139s

Max time network

102s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 984 wrote to memory of 2608 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 984 wrote to memory of 2608 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 984 wrote to memory of 2608 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2608 -ip 2608

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 612

Network

Country Destination Domain Proto
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
NL 23.62.61.194:443 www.bing.com tcp
US 8.8.8.8:53 75.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 194.61.62.23.in-addr.arpa udp
NL 23.62.61.194:443 www.bing.com tcp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 31.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 91.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp

Files

N/A