Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 09:05
Static task
static1
Behavioral task
behavioral1
Sample
z65orderrequest.bat.exe
Resource
win7-20240903-en
General
-
Target
z65orderrequest.bat.exe
-
Size
787KB
-
MD5
2a58425293da7dfb6b538be1a0938ae0
-
SHA1
f0c77f6e7b0aa956a69781cee03f178993c6b2b4
-
SHA256
1c93a68eefd2ba3fc952de91d44a3e95321819e0977ecd5e7dfb33ea47bfb052
-
SHA512
a520036a55b9cb63a9e5d1665378d6bf1f4c6922b1c8302e1e696c1d7e1e11d166d173435a8bf33a0c1f05826dee1e061d4d110459037c156cba29294d18f9ad
-
SSDEEP
12288:ZtSfgqcOZxX5BgvFnV6IBRudkPIUqMzABEcdmBIG8991x2HqMqFK1yoI:LSfgeXIvXDlI4wEcsBIFxwqFK1yoI
Malware Config
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2804 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Bkcy = "%Nastaliq191% -windowstyle minimized $Subeditorial=(Get-ItemProperty -Path 'HKCU:\\Tilsvar\\').spyddenes;%Nastaliq191% ($Subeditorial)" reg.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2804 powershell.exe 2192 wabmig.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2804 set thread context of 2192 2804 powershell.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language z65orderrequest.bat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wabmig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2464 reg.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2804 powershell.exe 2804 powershell.exe 2804 powershell.exe 2804 powershell.exe 2804 powershell.exe 2804 powershell.exe 2804 powershell.exe 2804 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2804 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2804 powershell.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2804 2172 z65orderrequest.bat.exe 30 PID 2172 wrote to memory of 2804 2172 z65orderrequest.bat.exe 30 PID 2172 wrote to memory of 2804 2172 z65orderrequest.bat.exe 30 PID 2172 wrote to memory of 2804 2172 z65orderrequest.bat.exe 30 PID 2804 wrote to memory of 2192 2804 powershell.exe 33 PID 2804 wrote to memory of 2192 2804 powershell.exe 33 PID 2804 wrote to memory of 2192 2804 powershell.exe 33 PID 2804 wrote to memory of 2192 2804 powershell.exe 33 PID 2804 wrote to memory of 2192 2804 powershell.exe 33 PID 2804 wrote to memory of 2192 2804 powershell.exe 33 PID 2192 wrote to memory of 2084 2192 wabmig.exe 34 PID 2192 wrote to memory of 2084 2192 wabmig.exe 34 PID 2192 wrote to memory of 2084 2192 wabmig.exe 34 PID 2192 wrote to memory of 2084 2192 wabmig.exe 34 PID 2084 wrote to memory of 2464 2084 cmd.exe 36 PID 2084 wrote to memory of 2464 2084 cmd.exe 36 PID 2084 wrote to memory of 2464 2084 cmd.exe 36 PID 2084 wrote to memory of 2464 2084 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\z65orderrequest.bat.exe"C:\Users\Admin\AppData\Local\Temp\z65orderrequest.bat.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Mangelsygdommen60=Get-Content 'C:\Users\Admin\AppData\Local\Temp\Travbanes\ahornsukker\diplospondylism\Maatterne\Blodkrft.bom';$Haandboldkamp=$Mangelsygdommen60.SubString(34049,3);.$Haandboldkamp($Mangelsygdommen60) "2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Program Files (x86)\windows mail\wabmig.exe"C:\Program Files (x86)\windows mail\wabmig.exe"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Bkcy" /t REG_EXPAND_SZ /d "%Nastaliq191% -windowstyle minimized $Subeditorial=(Get-ItemProperty -Path 'HKCU:\Tilsvar\').spyddenes;%Nastaliq191% ($Subeditorial)"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Bkcy" /t REG_EXPAND_SZ /d "%Nastaliq191% -windowstyle minimized $Subeditorial=(Get-ItemProperty -Path 'HKCU:\Tilsvar\').spyddenes;%Nastaliq191% ($Subeditorial)"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2464
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
330KB
MD50528c554e01f60a16333e6af6af4f61e
SHA184bd228765851e609d088e25f9058ec10b89cde5
SHA25689917a5b81b3c365eb2706d0dadc9a80728bfae69939eca783bb90f14ef10b75
SHA512d9f201240451f9050f7fdf8cb77a8eb6d4938bd206bed150cfdf280ab4a49717e30fcea3143732e205e39e378f9462f92454366852acf240e61f63dd66c507e0
-
Filesize
69KB
MD50dca59725c37090c84e951f4e5e366bd
SHA105ae81b9fbe45b0a77f7d556bd013554224a83a7
SHA2562812f694abf2e6417d92d7150c05c8d343dc29520f23c0248582b568310cdca0
SHA5128817ae6e86d4bbceb55b64b3371f4c92775923a9d7f2b28d8f741c625517837bf4c582ecb42c25ab315a80dd841fc2b4a2fc060566b4b8b8eeccba20c732ea42