Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    101s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/08/2024, 03:29

General

  • Target

    SKTGHRO77395797593759737593759375793753957Slummet55.exe

  • Size

    481KB

  • MD5

    6304403095a696f2c74a7e022ee18af6

  • SHA1

    a69d59aab5a94699ce0e5dea6304cb031f8d7c79

  • SHA256

    0a5611401f99d5b7ce0b7d1e13bda3e0e908abb487987c1c7d3d667f3c4c4e16

  • SHA512

    0d78df6576c24326fbd220bf7a116b52ceb57c6f1d86025c6b58b3c6e9de0b6a4cd79947a5aa59468033e45860eeebc6400c7704caa81911f24a8b79acf49c79

  • SSDEEP

    12288:FY1nHGrmqu9HZS05uwGStaQ5Y7JJRMgTAUdey43gqt5R:FY5HGrmqoMfwN5Y7JJA/35

Malware Config

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SKTGHRO77395797593759737593759375793753957Slummet55.exe
    "C:\Users\Admin\AppData\Local\Temp\SKTGHRO77395797593759737593759375793753957Slummet55.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3408
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle hidden "$Theorizers=Get-Content 'C:\Users\Admin\AppData\Local\potaskens\ugentlige\Synkronmotorernes\Swarthiness.Mor204';$Anneths163=$Theorizers.SubString(3987,3);.$Anneths163($Theorizers)"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4560
      • C:\Users\Admin\AppData\Local\Temp\Impulsory.exe
        "C:\Users\Admin\AppData\Local\Temp\Impulsory.exe"
        3⤵
        • Loads dropped DLL
        • Suspicious use of NtCreateThreadExHideFromDebugger
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1184

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Impulsory.exe

    Filesize

    481KB

    MD5

    6304403095a696f2c74a7e022ee18af6

    SHA1

    a69d59aab5a94699ce0e5dea6304cb031f8d7c79

    SHA256

    0a5611401f99d5b7ce0b7d1e13bda3e0e908abb487987c1c7d3d667f3c4c4e16

    SHA512

    0d78df6576c24326fbd220bf7a116b52ceb57c6f1d86025c6b58b3c6e9de0b6a4cd79947a5aa59468033e45860eeebc6400c7704caa81911f24a8b79acf49c79

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_isskcj2s.kx2.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\potaskens\ugentlige\Synkronmotorernes\Corbiculum152.Gan

    Filesize

    367KB

    MD5

    9a262156e0c02952a4d95e35dcc68eac

    SHA1

    921c0335bf2cfee0fd2eee9f81d3b2bb6b176c7c

    SHA256

    c9f6393d23bd17d6e4a213bf0293750bd1d7e4e17c8061fb550a145e29cfa449

    SHA512

    c7ca0a2d1f23294b72430933a0cf6988926a28cdeec77c3ba73797f15b3c831782b7fdf86b307bdf59d37ba4097e48615df380ed6f9ebb2d694713bedbf77fef

  • C:\Users\Admin\AppData\Local\potaskens\ugentlige\Synkronmotorernes\Swarthiness.Mor204

    Filesize

    56KB

    MD5

    0b828f90d4a23ca0f2141e135a7b50b7

    SHA1

    d69a8fdfdd74b315c42e6a854773d8eb6bb3ca2f

    SHA256

    d25e8f1e81bf5a143523ccf23bbaa796d3a1d00fb944ecfe8f9f3119828c4a57

    SHA512

    b040903dbda02b94e672bb655818a020e535c1b414db3625e97a9c8b9a4f53374e426a0108697953e322593e0cbc0f5b5a41a9a3e843fc4ff329cec7b50ac250

  • memory/1184-67-0x0000000001660000-0x0000000004BE4000-memory.dmp

    Filesize

    53.5MB

  • memory/1184-60-0x0000000001660000-0x0000000004BE4000-memory.dmp

    Filesize

    53.5MB

  • memory/1184-54-0x00000000777D1000-0x00000000778F1000-memory.dmp

    Filesize

    1.1MB

  • memory/1184-53-0x0000000077858000-0x0000000077859000-memory.dmp

    Filesize

    4KB

  • memory/1184-52-0x00000000777D1000-0x00000000778F1000-memory.dmp

    Filesize

    1.1MB

  • memory/1184-50-0x0000000000400000-0x0000000001654000-memory.dmp

    Filesize

    18.3MB

  • memory/4560-35-0x0000000073D80000-0x0000000074530000-memory.dmp

    Filesize

    7.7MB

  • memory/4560-40-0x0000000008C20000-0x000000000C1A4000-memory.dmp

    Filesize

    53.5MB

  • memory/4560-28-0x0000000007320000-0x00000000073B6000-memory.dmp

    Filesize

    600KB

  • memory/4560-29-0x0000000006890000-0x00000000068AA000-memory.dmp

    Filesize

    104KB

  • memory/4560-30-0x00000000068E0000-0x0000000006902000-memory.dmp

    Filesize

    136KB

  • memory/4560-31-0x0000000007970000-0x0000000007F14000-memory.dmp

    Filesize

    5.6MB

  • memory/4560-26-0x0000000006380000-0x000000000639E000-memory.dmp

    Filesize

    120KB

  • memory/4560-33-0x00000000085A0000-0x0000000008C1A000-memory.dmp

    Filesize

    6.5MB

  • memory/4560-8-0x0000000073D8E000-0x0000000073D8F000-memory.dmp

    Filesize

    4KB

  • memory/4560-36-0x0000000073D80000-0x0000000074530000-memory.dmp

    Filesize

    7.7MB

  • memory/4560-37-0x0000000073D80000-0x0000000074530000-memory.dmp

    Filesize

    7.7MB

  • memory/4560-21-0x0000000005D90000-0x00000000060E4000-memory.dmp

    Filesize

    3.3MB

  • memory/4560-39-0x0000000073D80000-0x0000000074530000-memory.dmp

    Filesize

    7.7MB

  • memory/4560-27-0x0000000006480000-0x00000000064CC000-memory.dmp

    Filesize

    304KB

  • memory/4560-42-0x0000000073D80000-0x0000000074530000-memory.dmp

    Filesize

    7.7MB

  • memory/4560-41-0x0000000073D8E000-0x0000000073D8F000-memory.dmp

    Filesize

    4KB

  • memory/4560-43-0x0000000073D80000-0x0000000074530000-memory.dmp

    Filesize

    7.7MB

  • memory/4560-46-0x0000000073D80000-0x0000000074530000-memory.dmp

    Filesize

    7.7MB

  • memory/4560-15-0x0000000005D20000-0x0000000005D86000-memory.dmp

    Filesize

    408KB

  • memory/4560-47-0x0000000073D80000-0x0000000074530000-memory.dmp

    Filesize

    7.7MB

  • memory/4560-49-0x0000000073D80000-0x0000000074530000-memory.dmp

    Filesize

    7.7MB

  • memory/4560-14-0x0000000005CB0000-0x0000000005D16000-memory.dmp

    Filesize

    408KB

  • memory/4560-51-0x0000000073D80000-0x0000000074530000-memory.dmp

    Filesize

    7.7MB

  • memory/4560-13-0x00000000053B0000-0x00000000053D2000-memory.dmp

    Filesize

    136KB

  • memory/4560-12-0x0000000073D80000-0x0000000074530000-memory.dmp

    Filesize

    7.7MB

  • memory/4560-11-0x0000000073D80000-0x0000000074530000-memory.dmp

    Filesize

    7.7MB

  • memory/4560-10-0x0000000005510000-0x0000000005B38000-memory.dmp

    Filesize

    6.2MB

  • memory/4560-9-0x0000000002DA0000-0x0000000002DD6000-memory.dmp

    Filesize

    216KB