Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/09/2024, 01:21
Static task
static1
Behavioral task
behavioral1
Sample
f47cab9eface9209fb0f87cc93b605c08f332f7447389edd831ef7e12f69fbb7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f47cab9eface9209fb0f87cc93b605c08f332f7447389edd831ef7e12f69fbb7.exe
Resource
win10v2004-20240802-en
General
-
Target
f47cab9eface9209fb0f87cc93b605c08f332f7447389edd831ef7e12f69fbb7.exe
-
Size
915KB
-
MD5
68201a6f398b098b4994a9e5f2d4405c
-
SHA1
5a39054a39b347e9d294bc42927861692bc03b6b
-
SHA256
f47cab9eface9209fb0f87cc93b605c08f332f7447389edd831ef7e12f69fbb7
-
SHA512
5fc21c049f18297d1d27857dd433a5df77d1bcbc8ecf7ab796ad91443f406355e70159759e519fee313b136ca63179fe2b81fd2f7cdb47868ce5ef9743db6da8
-
SSDEEP
12288:DBfOreqgPSOONGdVAhCssylYH+ZQnBPmQ8HjWsgrqpqfyl0fGXJ9BqNJowksV3:hOreq0OMAxsyuHdUHjvEO0fG5vq7Hx
Malware Config
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2868 powershell.exe -
Loads dropped DLL 2 IoCs
pid Process 2868 powershell.exe 2196 Raadnetanken.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\kingrow = "%Dfa% -windowstyle minimized $Celebrer=(Get-ItemProperty -Path 'HKCU:\\Overvre\\').Fljtets;%Dfa% ($Celebrer)" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 drive.google.com 5 drive.google.com -
Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
pid Process 2196 Raadnetanken.exe 2196 Raadnetanken.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2868 powershell.exe 2196 Raadnetanken.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2868 set thread context of 2196 2868 powershell.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f47cab9eface9209fb0f87cc93b605c08f332f7447389edd831ef7e12f69fbb7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Raadnetanken.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2360 reg.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2868 powershell.exe 2868 powershell.exe 2868 powershell.exe 2868 powershell.exe 2868 powershell.exe 2868 powershell.exe 2868 powershell.exe 2868 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2868 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2868 powershell.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2868 2640 f47cab9eface9209fb0f87cc93b605c08f332f7447389edd831ef7e12f69fbb7.exe 30 PID 2640 wrote to memory of 2868 2640 f47cab9eface9209fb0f87cc93b605c08f332f7447389edd831ef7e12f69fbb7.exe 30 PID 2640 wrote to memory of 2868 2640 f47cab9eface9209fb0f87cc93b605c08f332f7447389edd831ef7e12f69fbb7.exe 30 PID 2640 wrote to memory of 2868 2640 f47cab9eface9209fb0f87cc93b605c08f332f7447389edd831ef7e12f69fbb7.exe 30 PID 2868 wrote to memory of 2196 2868 powershell.exe 33 PID 2868 wrote to memory of 2196 2868 powershell.exe 33 PID 2868 wrote to memory of 2196 2868 powershell.exe 33 PID 2868 wrote to memory of 2196 2868 powershell.exe 33 PID 2868 wrote to memory of 2196 2868 powershell.exe 33 PID 2868 wrote to memory of 2196 2868 powershell.exe 33 PID 2196 wrote to memory of 2976 2196 Raadnetanken.exe 34 PID 2196 wrote to memory of 2976 2196 Raadnetanken.exe 34 PID 2196 wrote to memory of 2976 2196 Raadnetanken.exe 34 PID 2196 wrote to memory of 2976 2196 Raadnetanken.exe 34 PID 2976 wrote to memory of 2360 2976 cmd.exe 36 PID 2976 wrote to memory of 2360 2976 cmd.exe 36 PID 2976 wrote to memory of 2360 2976 cmd.exe 36 PID 2976 wrote to memory of 2360 2976 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\f47cab9eface9209fb0f87cc93b605c08f332f7447389edd831ef7e12f69fbb7.exe"C:\Users\Admin\AppData\Local\Temp\f47cab9eface9209fb0f87cc93b605c08f332f7447389edd831ef7e12f69fbb7.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Showpiece44=Get-Content 'C:\Users\Admin\AppData\Local\twinsomeness\Duperingernes.ing';$Subfluid=$Showpiece44.SubString(24464,3);.$Subfluid($Showpiece44)"2⤵
- Command and Scripting Interpreter: PowerShell
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\Raadnetanken.exe"C:\Users\Admin\AppData\Local\Temp\Raadnetanken.exe"3⤵
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "kingrow" /t REG_EXPAND_SZ /d "%Dfa% -windowstyle minimized $Celebrer=(Get-ItemProperty -Path 'HKCU:\Overvre\').Fljtets;%Dfa% ($Celebrer)"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "kingrow" /t REG_EXPAND_SZ /d "%Dfa% -windowstyle minimized $Celebrer=(Get-ItemProperty -Path 'HKCU:\Overvre\').Fljtets;%Dfa% ($Celebrer)"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2360
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5f9a33a09287d7157286f38877c443dea
SHA1b4be7206cf4a5de226c3595bea2d4c2d0cbe1ecc
SHA2562b2f4b4baea1491aa69ec9829bb56f92f0d0525aed11a1a117c9942d1e70e0d2
SHA512b3b522b563a2118ae4ab914d63ddc30ef83035ea33642abfcc28b5544167b82124c60feb61fd98186cc3387cab88151a587e85dc894e8a824d9fa7a7bb743252
-
Filesize
357KB
MD58315fece2c735c00d3bbbeebbe094958
SHA128a1732cebbdfff364474622f954c5ae30067bc3
SHA2563ab4200bc1e7592168a8eab5ad57af8b98dfb538b5934e8ffd0673531ab2b481
SHA512e0e837e888a6e40c8339fdec8a18dc29ecefadaeef9880b651f3570fa668596cebd3951ba1b14aba6c4cdfa0ce5c2c01dd50cea95911fd5d3ff1eb416d39117c
-
Filesize
915KB
MD568201a6f398b098b4994a9e5f2d4405c
SHA15a39054a39b347e9d294bc42927861692bc03b6b
SHA256f47cab9eface9209fb0f87cc93b605c08f332f7447389edd831ef7e12f69fbb7
SHA5125fc21c049f18297d1d27857dd433a5df77d1bcbc8ecf7ab796ad91443f406355e70159759e519fee313b136ca63179fe2b81fd2f7cdb47868ce5ef9743db6da8