Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23/09/2024, 14:09
Static task
static1
Behavioral task
behavioral1
Sample
لیست اقلام اسکنشده شماره ۱۱۷۵۶.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
لیست اقلام اسکنشده شماره ۱۱۷۵۶.vbs
Resource
win10v2004-20240802-en
General
-
Target
لیست اقلام اسکنشده شماره ۱۱۷۵۶.vbs
-
Size
1.3MB
-
MD5
f2539546e643a5d82ab2bd6b0479268e
-
SHA1
879469261c3799ba7b10dde416917e2f784d74f7
-
SHA256
a0bd83b306ca7068752f3d9db6d8612d7a365c1a5ab9c8d636f6028321ebcd39
-
SHA512
96f25265f072994703328526098cea8278fe87937e1552a00b1c210e716b85ef9d6489e3099d82f8a7b75173dc751ab01330ead72951b0c93deffa7bb377507d
-
SSDEEP
12288:HXysOJVCGdmCx8gav0Ejfdk47/SdDf5Px+T6cs7BFEYCc8Paj4sMHuMayv3ShEn/:HXysTGdNx8g76lgdDx0oBWYqaYTS+dl
Malware Config
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Executes dropped EXE 1 IoCs
pid Process 2700 x.exe -
Loads dropped DLL 3 IoCs
pid Process 2700 x.exe 2700 x.exe 2180 x.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2700 x.exe 2180 x.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2700 set thread context of 2180 2700 x.exe 31 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\deployeret.ini x.exe File opened for modification C:\Program Files (x86)\supranaturalismen\Countinghouse.ini x.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Fonts\boltet.ini x.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2700 x.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2144 wrote to memory of 2700 2144 WScript.exe 30 PID 2144 wrote to memory of 2700 2144 WScript.exe 30 PID 2144 wrote to memory of 2700 2144 WScript.exe 30 PID 2144 wrote to memory of 2700 2144 WScript.exe 30 PID 2700 wrote to memory of 2180 2700 x.exe 31 PID 2700 wrote to memory of 2180 2700 x.exe 31 PID 2700 wrote to memory of 2180 2700 x.exe 31 PID 2700 wrote to memory of 2180 2700 x.exe 31 PID 2700 wrote to memory of 2180 2700 x.exe 31 PID 2700 wrote to memory of 2180 2700 x.exe 31
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\لیست اقلام اسکنشده شماره ۱۱۷۵۶.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\x.exe"C:\Users\Admin\AppData\Local\Temp\x.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\x.exe"C:\Users\Admin\AppData\Local\Temp\x.exe"3⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2180
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42B
MD508b861a994371c6bc37569782db196ac
SHA1fe09ad55fe3192a9df9a6c2f4ac5418a5f49680a
SHA256f1b1acd0cd8cb0a26ea7d27620867245afc03db3a00448bcfc4129267501ad82
SHA512a4edde2de2b3092cccf64e17009a1d0f89d70e0457b9a1122b93e03f415c4110f5c3ef4cb35e1f5e4722f1a980372ad293609fc28cdc19d014acbfe3b76228ce
-
Filesize
898KB
MD533b10af4d2a644e0b646dad220c18f57
SHA1a6a07dcce167941677adc71037abebb8265afd87
SHA25624a45d78ef486e056742ee6fe616ccdde6c1a7616b113d59ec61aa86abcf7bfc
SHA5124ff75911722bc2fac00dce1ee0fea72341e704e4d5d4acc77b651384e80a76140da32b5c97f5e3a9e7167e8eff2c2426516bdde17b6fcc3ed5b42334c982b877
-
Filesize
12KB
MD5d968cb2b98b83c03a9f02dd9b8df97dc
SHA1d784c9b7a92dce58a5038beb62a48ff509e166a0
SHA256a4ec98011ef99e595912718c1a1bf1aa67bfc2192575729d42f559d01f67b95c
SHA5122ee41dc68f329a1519a8073ece7d746c9f3bf45d8ef3b915deb376af37e26074134af5f83c8af0fe0ab227f0d1acca9f37e5ca7ae37c46c3bcc0331fe5e2b97e