Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/09/2024, 11:56
Static task
static1
Behavioral task
behavioral1
Sample
1116543711892424.scr
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1116543711892424.scr
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
General
-
Target
1116543711892424.scr
-
Size
1.0MB
-
MD5
4648a0278bd003c324fcd7e7779dcf99
-
SHA1
401623540094e2eef531d366d8c155c1d3d72abb
-
SHA256
49260a07ff0d5c06efdfc3985bcc44d6df5cf2a56810f01c3243684b950264cc
-
SHA512
198d5db4bb4f612645786c27cdacb26665db4099cd8580091adf86d9d84fc16278d3a87c410912cb4968c630dca1cc14432551673fb7653ad83f28b601720da5
-
SSDEEP
12288:x9XMnptEWw7TAIh1LSw84bjZgyrMNAzP6RtRQXl51KBkpw8+QZ0:rcnsWw7sIh1uQba4mRjQVP2UkV
Malware Config
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Loads dropped DLL 1 IoCs
pid Process 2496 1116543711892424.scr -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2496 1116543711892424.scr 116 1116543711892424.scr -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2496 set thread context of 116 2496 1116543711892424.scr 82 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\sorteringsordenens.lnk 1116543711892424.scr File opened for modification C:\Program Files (x86)\sorteringsordenens.lnk 1116543711892424.scr -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1116543711892424.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1116543711892424.scr -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2496 1116543711892424.scr -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2496 wrote to memory of 116 2496 1116543711892424.scr 82 PID 2496 wrote to memory of 116 2496 1116543711892424.scr 82 PID 2496 wrote to memory of 116 2496 1116543711892424.scr 82 PID 2496 wrote to memory of 116 2496 1116543711892424.scr 82 PID 2496 wrote to memory of 116 2496 1116543711892424.scr 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\1116543711892424.scr"C:\Users\Admin\AppData\Local\Temp\1116543711892424.scr" /S1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\1116543711892424.scr"C:\Users\Admin\AppData\Local\Temp\1116543711892424.scr" /S2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
902B
MD5610d4c4d42ada0e155ebdaaf4108e012
SHA13e81cf599a883b7b7f81abd95480366abb251187
SHA2566a81977175b3df98578072b4a2646a7d7f8518a73d9b14eb1d8d1cf80cd015fd
SHA5124f0eb5ec2212f6ba66d0aa352c092c1cfa5b6cb6a917da1df52e8f32922e6b86e9d282eb28b01ccd9ffd8afc796f8d78ddec2e09963b727837125cd53c20c227
-
Filesize
11KB
MD5a436db0c473a087eb61ff5c53c34ba27
SHA165ea67e424e75f5065132b539c8b2eda88aa0506
SHA25675ed40311875312617d6711baed0be29fcaee71031ca27a8d308a72b15a51e49
SHA512908f46a855480af6eacb2fb64de0e60b1e04bbb10b23992e2cf38a4cbebdcd7d3928c4c022d7ad9f7479265a8f426b93eef580afec95570e654c360d62f5e08d