Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/09/2024, 11:56
Static task
static1
Behavioral task
behavioral1
Sample
1116543711892424.scr
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1116543711892424.scr
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
General
-
Target
1116543711892424.scr
-
Size
1.0MB
-
MD5
4648a0278bd003c324fcd7e7779dcf99
-
SHA1
401623540094e2eef531d366d8c155c1d3d72abb
-
SHA256
49260a07ff0d5c06efdfc3985bcc44d6df5cf2a56810f01c3243684b950264cc
-
SHA512
198d5db4bb4f612645786c27cdacb26665db4099cd8580091adf86d9d84fc16278d3a87c410912cb4968c630dca1cc14432551673fb7653ad83f28b601720da5
-
SSDEEP
12288:x9XMnptEWw7TAIh1LSw84bjZgyrMNAzP6RtRQXl51KBkpw8+QZ0:rcnsWw7sIh1uQba4mRjQVP2UkV
Malware Config
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Loads dropped DLL 1 IoCs
pid Process 2732 1116543711892424.scr -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2732 1116543711892424.scr 760 1116543711892424.scr -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2732 set thread context of 760 2732 1116543711892424.scr 30 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\sorteringsordenens.lnk 1116543711892424.scr File opened for modification C:\Program Files (x86)\sorteringsordenens.lnk 1116543711892424.scr -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1116543711892424.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1116543711892424.scr -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2732 1116543711892424.scr -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2732 wrote to memory of 760 2732 1116543711892424.scr 30 PID 2732 wrote to memory of 760 2732 1116543711892424.scr 30 PID 2732 wrote to memory of 760 2732 1116543711892424.scr 30 PID 2732 wrote to memory of 760 2732 1116543711892424.scr 30 PID 2732 wrote to memory of 760 2732 1116543711892424.scr 30 PID 2732 wrote to memory of 760 2732 1116543711892424.scr 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1116543711892424.scr"C:\Users\Admin\AppData\Local\Temp\1116543711892424.scr" /S1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\1116543711892424.scr"C:\Users\Admin\AppData\Local\Temp\1116543711892424.scr" /S2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
890B
MD5c0b318384984f60f2156e4dff97ca266
SHA1339daacb98256a33f32d4e797a9be99528a49dd8
SHA25693d5dab9a5d9ebce55f4dc855f4a0420cc0ad67dd8cd69a96fa116fb19e001dd
SHA512d9690404b504cd64bf56a7ee7c4b9d3316295e298c5f03d6d6b43c3028102f567595d306688465f05120bdc83a3a49ad2a12a9467b3b2ab695dce54697e83ecf
-
Filesize
11KB
MD5a436db0c473a087eb61ff5c53c34ba27
SHA165ea67e424e75f5065132b539c8b2eda88aa0506
SHA25675ed40311875312617d6711baed0be29fcaee71031ca27a8d308a72b15a51e49
SHA512908f46a855480af6eacb2fb64de0e60b1e04bbb10b23992e2cf38a4cbebdcd7d3928c4c022d7ad9f7479265a8f426b93eef580afec95570e654c360d62f5e08d