Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/06/2024, 01:59

General

  • Target

    a8b78aa0870056b9eb000f19d4aa732acd3b3657c905ca333ca772a0e9e31290.exe

  • Size

    588KB

  • MD5

    ff3f9946159ede1ea69dc8e74991c5eb

  • SHA1

    790a8dd8acac3557bff7d43511a176ad57faadc8

  • SHA256

    a8b78aa0870056b9eb000f19d4aa732acd3b3657c905ca333ca772a0e9e31290

  • SHA512

    b22399c5fad7f4f5433fbc58fb8ed10de22c49c3a4d6689d82eb1959411485e3759199bd30979170bc5f6a03b5f1fe6b60fd0e2d1fd8d9b82aade49d9a220978

  • SSDEEP

    12288:OiR6qChjvVW+/cfkyZ8421XXFwXo8fDZk8K/H0zLjT8o/h:OiRwvL2kyI1XXFwZ2ujgo/h

Score
10/10

Malware Config

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Loads dropped DLL 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a8b78aa0870056b9eb000f19d4aa732acd3b3657c905ca333ca772a0e9e31290.exe
    "C:\Users\Admin\AppData\Local\Temp\a8b78aa0870056b9eb000f19d4aa732acd3b3657c905ca333ca772a0e9e31290.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:4164
    • C:\Users\Admin\AppData\Local\Temp\a8b78aa0870056b9eb000f19d4aa732acd3b3657c905ca333ca772a0e9e31290.exe
      "C:\Users\Admin\AppData\Local\Temp\a8b78aa0870056b9eb000f19d4aa732acd3b3657c905ca333ca772a0e9e31290.exe"
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:3656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsv3C00.tmp\System.dll

    Filesize

    12KB

    MD5

    d968cb2b98b83c03a9f02dd9b8df97dc

    SHA1

    d784c9b7a92dce58a5038beb62a48ff509e166a0

    SHA256

    a4ec98011ef99e595912718c1a1bf1aa67bfc2192575729d42f559d01f67b95c

    SHA512

    2ee41dc68f329a1519a8073ece7d746c9f3bf45d8ef3b915deb376af37e26074134af5f83c8af0fe0ab227f0d1acca9f37e5ca7ae37c46c3bcc0331fe5e2b97e

  • C:\Users\Public\Music\kolorister.lnk

    Filesize

    984B

    MD5

    46603334df98ea8d54ef5a1a2dab2acb

    SHA1

    c441067a0e8566989de4304510da4cdba91be51d

    SHA256

    007358a20fb094651eedcf66056f0580996927b12bfd1d99676bbb80d189f87b

    SHA512

    2cf8ca5b9ba9b2a47a25f750bf49dd0c8fa9bea515c3c209e962390fcae8fe3ce7cb6f5fc604f73f2eda78349be790ce9c01306b3e5eeb94d306f767ce0d1c26

  • memory/3656-239-0x0000000001850000-0x0000000002A0A000-memory.dmp

    Filesize

    17.7MB

  • memory/3656-240-0x0000000077C08000-0x0000000077C09000-memory.dmp

    Filesize

    4KB

  • memory/3656-242-0x00000000005F0000-0x0000000001844000-memory.dmp

    Filesize

    18.3MB

  • memory/3656-243-0x0000000001850000-0x0000000002A0A000-memory.dmp

    Filesize

    17.7MB

  • memory/3656-245-0x0000000077B81000-0x0000000077CA1000-memory.dmp

    Filesize

    1.1MB

  • memory/4164-236-0x0000000004A50000-0x0000000005C0A000-memory.dmp

    Filesize

    17.7MB

  • memory/4164-237-0x0000000077B81000-0x0000000077CA1000-memory.dmp

    Filesize

    1.1MB

  • memory/4164-238-0x00000000749E5000-0x00000000749E6000-memory.dmp

    Filesize

    4KB

  • memory/4164-241-0x0000000004A50000-0x0000000005C0A000-memory.dmp

    Filesize

    17.7MB

  • memory/4164-250-0x0000000004A50000-0x0000000005C0A000-memory.dmp

    Filesize

    17.7MB