Analysis
-
max time kernel
94s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 01:12
Static task
static1
Behavioral task
behavioral1
Sample
11965b0ef90eb8c16c93aa0a141c6c96cb74d71f4a069bb76d18e1cb1e3347c1.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
11965b0ef90eb8c16c93aa0a141c6c96cb74d71f4a069bb76d18e1cb1e3347c1.vbs
Resource
win10v2004-20240802-en
General
-
Target
11965b0ef90eb8c16c93aa0a141c6c96cb74d71f4a069bb76d18e1cb1e3347c1.vbs
-
Size
1.6MB
-
MD5
d0be1e1b67cf387257e3dea947ed49e8
-
SHA1
e16222b612d74c888cc8357d1e2352ea2d8939a3
-
SHA256
11965b0ef90eb8c16c93aa0a141c6c96cb74d71f4a069bb76d18e1cb1e3347c1
-
SHA512
5a8c8920e1ebd061fd32e1215dafaef6765ca00cc1446b29dc3a9b77fd4280c509fe2e4b4b21f46cc463f661c90f9fb08d06b81db96c3ebb547e9f382c6dbf56
-
SSDEEP
24576:2Eeps6dHJFR2QlXTu3AoZBn7aw6ccWtxSX3KAHSK:0s6dt8x7r5cv
Malware Config
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 1 IoCs
pid Process 3760 x.exe -
Loads dropped DLL 2 IoCs
pid Process 3760 x.exe 1552 x.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3760 x.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3760 set thread context of 1552 3760 x.exe 87 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\sorteringsordenens.lnk x.exe File opened for modification C:\Program Files (x86)\sorteringsordenens.lnk x.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x0008000000023497-4.dat nsis_installer_1 behavioral2/files/0x0008000000023497-4.dat nsis_installer_2 -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3760 x.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3304 wrote to memory of 3760 3304 WScript.exe 82 PID 3304 wrote to memory of 3760 3304 WScript.exe 82 PID 3304 wrote to memory of 3760 3304 WScript.exe 82 PID 3760 wrote to memory of 1552 3760 x.exe 87 PID 3760 wrote to memory of 1552 3760 x.exe 87 PID 3760 wrote to memory of 1552 3760 x.exe 87 PID 3760 wrote to memory of 1552 3760 x.exe 87 PID 3760 wrote to memory of 1552 3760 x.exe 87
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\11965b0ef90eb8c16c93aa0a141c6c96cb74d71f4a069bb76d18e1cb1e3347c1.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\x.exe"C:\Users\Admin\AppData\Local\Temp\x.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\x.exe"C:\Users\Admin\AppData\Local\Temp\x.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1552
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
906B
MD5b6e91048136ff53f6a0cbe5350f6763f
SHA14421a4f60c2b56eb5037bcf5cebfd9f7d1f0f63f
SHA2567b3cab50924c040b6f4d718ce1645a44e048c93e66f8560b2b43d668c6f5bc65
SHA512b1155364de13484ac7a22310144ca4370bdcb0e0cc1233614bfe2fce9e5033dda3a156a2d093351d2d11e23643db0976dd9731d413eb4e1328fb76205a32e259
-
Filesize
11KB
MD5a436db0c473a087eb61ff5c53c34ba27
SHA165ea67e424e75f5065132b539c8b2eda88aa0506
SHA25675ed40311875312617d6711baed0be29fcaee71031ca27a8d308a72b15a51e49
SHA512908f46a855480af6eacb2fb64de0e60b1e04bbb10b23992e2cf38a4cbebdcd7d3928c4c022d7ad9f7479265a8f426b93eef580afec95570e654c360d62f5e08d
-
Filesize
1.0MB
MD54648a0278bd003c324fcd7e7779dcf99
SHA1401623540094e2eef531d366d8c155c1d3d72abb
SHA25649260a07ff0d5c06efdfc3985bcc44d6df5cf2a56810f01c3243684b950264cc
SHA512198d5db4bb4f612645786c27cdacb26665db4099cd8580091adf86d9d84fc16278d3a87c410912cb4968c630dca1cc14432551673fb7653ad83f28b601720da5