Analysis
-
max time kernel
144s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-07-2024 07:40
Static task
static1
Behavioral task
behavioral1
Sample
BPN__S-I03810366200624-820240628503036_202407010849535435_20240702135021·pdf.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
BPN__S-I03810366200624-820240628503036_202407010849535435_20240702135021·pdf.exe
Resource
win10v2004-20240611-en
General
-
Target
BPN__S-I03810366200624-820240628503036_202407010849535435_20240702135021·pdf.exe
-
Size
913KB
-
MD5
811a6608bd141b5c41cceaa9d1e7ee52
-
SHA1
63ee2d9a226ada53731204f906f5030cb6a28076
-
SHA256
1de20ab31a930a9f60a323ad35c4a0d670fc457cee78357d099784487bd8c9eb
-
SHA512
a27becb13d18fa4eb4c634ba2fb780505badd210fa380951948da1c9e56471649773786a2c0f35f889aa19981043f03375b10477b4b7b1fe10461dcedd8ca6cb
-
SSDEEP
12288:fBfOreq6OBi6FVd5cw6HETDVVKmuqCsV2qpqfyl0fGXJ9BqNJowksVz:lOreq6O9FRc2xVS5WEO0fG5vq7H
Malware Config
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2788 powershell.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook wab.exe Key opened \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook wab.exe Key opened \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook wab.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 drive.google.com 3 drive.google.com -
Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
pid Process 2120 wab.exe 2120 wab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2788 powershell.exe 2120 wab.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2788 set thread context of 2120 2788 powershell.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2788 powershell.exe 2788 powershell.exe 2788 powershell.exe 2788 powershell.exe 2788 powershell.exe 2788 powershell.exe 2788 powershell.exe 2788 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2788 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2788 powershell.exe Token: SeDebugPrivilege 2120 wab.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2788 2844 BPN__S-I03810366200624-820240628503036_202407010849535435_20240702135021·pdf.exe 28 PID 2844 wrote to memory of 2788 2844 BPN__S-I03810366200624-820240628503036_202407010849535435_20240702135021·pdf.exe 28 PID 2844 wrote to memory of 2788 2844 BPN__S-I03810366200624-820240628503036_202407010849535435_20240702135021·pdf.exe 28 PID 2844 wrote to memory of 2788 2844 BPN__S-I03810366200624-820240628503036_202407010849535435_20240702135021·pdf.exe 28 PID 2788 wrote to memory of 2120 2788 powershell.exe 31 PID 2788 wrote to memory of 2120 2788 powershell.exe 31 PID 2788 wrote to memory of 2120 2788 powershell.exe 31 PID 2788 wrote to memory of 2120 2788 powershell.exe 31 PID 2788 wrote to memory of 2120 2788 powershell.exe 31 PID 2788 wrote to memory of 2120 2788 powershell.exe 31 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook wab.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook wab.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\BPN__S-I03810366200624-820240628503036_202407010849535435_20240702135021·pdf.exe"C:\Users\Admin\AppData\Local\Temp\BPN__S-I03810366200624-820240628503036_202407010849535435_20240702135021·pdf.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$unterraced=Get-Content 'C:\Users\Admin\AppData\Local\twinsomeness\Pissoirers\Spirochete204.Myc';$Lagerekspedient=$unterraced.SubString(66375,3);.$Lagerekspedient($unterraced)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"3⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2120
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
349KB
MD54278592189a8cf3b0cc374530489b451
SHA1d940efc32e83c28cda2944328990bf003a4fcef5
SHA256ce8ec891957bff40554b1ae1c98eadbcd5e22e435e6002f0153e84f0e9c03b8d
SHA512026c66b10dbbef0a018eaa6922d065db009bdde3fa064a63c68d659543ca5ceae232e77bddae4a6d0284a6f5801a1ea1af31ec8db88906d9ad530dc6964f1b0b
-
Filesize
69KB
MD520aa894e99916487d81dbe300b79fc2e
SHA1adc74679240e54c6c18bb8aecfebdd0be6c83ba2
SHA2560b52c1fa9332130ff96449b7b0449c15f46e707029232e6b73933ba39195e723
SHA512cf2fbc0a23487b5eecbd3320981a7606b1725239ebf06d4059850dc3f1d444d6bb4e38c4e5e3bd59d0b5a95d73e3aeccc30290682543d3735fdca8dff81e4593
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1298544033-3225604241-2703760938-1000\0f5007522459c86e95ffcc62f32308f1_e3fd1d67-4513-4809-a7f1-bf54bd53bdbc
Filesize46B
MD5d898504a722bff1524134c6ab6a5eaa5
SHA1e0fdc90c2ca2a0219c99d2758e68c18875a3e11e
SHA256878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9
SHA51226a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1298544033-3225604241-2703760938-1000\0f5007522459c86e95ffcc62f32308f1_e3fd1d67-4513-4809-a7f1-bf54bd53bdbc
Filesize46B
MD5c07225d4e7d01d31042965f048728a0a
SHA169d70b340fd9f44c89adb9a2278df84faa9906b7
SHA2568c136c7ae08020ad16fd1928e36ad335ddef8b85906d66b712fff049aa57dc9a
SHA51223d3cea738e1abf561320847c39dadc8b5794d7bd8761b0457956f827a17ad2556118b909a3e6929db79980ccf156a6f58ac823cf88329e62417d2807b34b64b