Analysis
-
max time kernel
151s -
max time network
280s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
17-10-2024 19:42
Static task
static1
Behavioral task
behavioral1
Sample
Dannebrogsordnen.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Dannebrogsordnen.exe
Resource
win11-20241007-en
General
-
Target
Dannebrogsordnen.exe
-
Size
708KB
-
MD5
f259324bd799aa19142a7aadce371900
-
SHA1
5c977b560c2aa6e7e016388c8c5737688ba8016f
-
SHA256
59c46bca7b151554f067bb4a5bad03c984db9d1d2eda59124495f399741e7897
-
SHA512
539d881b45e98433868c2ed2be341af04987af2736e47b6160dcd30d3bbe7e57f7c54e2db539b238bdbc0f7ce1860620e5d2791b5b8ff38ae978ed1bff0e4d5b
-
SSDEEP
12288:grgjBLiIK2WVy/YqpupTj+aRIGvVg8LYCI2ugcY97FB95ByrhXmmwMRzcLSIHp:g0jBiIK2R/5pupbIGu0Y7ncr2XjZcWIJ
Malware Config
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Loads dropped DLL 2 IoCs
pid Process 2036 Dannebrogsordnen.exe 2036 Dannebrogsordnen.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 drive.google.com 2 drive.google.com -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 780 Dannebrogsordnen.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2036 Dannebrogsordnen.exe 780 Dannebrogsordnen.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2036 set thread context of 780 2036 Dannebrogsordnen.exe 77 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dannebrogsordnen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dannebrogsordnen.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 780 Dannebrogsordnen.exe 780 Dannebrogsordnen.exe 780 Dannebrogsordnen.exe 780 Dannebrogsordnen.exe 780 Dannebrogsordnen.exe 780 Dannebrogsordnen.exe 780 Dannebrogsordnen.exe 780 Dannebrogsordnen.exe 780 Dannebrogsordnen.exe 780 Dannebrogsordnen.exe 780 Dannebrogsordnen.exe 780 Dannebrogsordnen.exe 780 Dannebrogsordnen.exe 780 Dannebrogsordnen.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2036 Dannebrogsordnen.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2036 wrote to memory of 780 2036 Dannebrogsordnen.exe 77 PID 2036 wrote to memory of 780 2036 Dannebrogsordnen.exe 77 PID 2036 wrote to memory of 780 2036 Dannebrogsordnen.exe 77 PID 2036 wrote to memory of 780 2036 Dannebrogsordnen.exe 77 PID 2036 wrote to memory of 780 2036 Dannebrogsordnen.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\Dannebrogsordnen.exe"C:\Users\Admin\AppData\Local\Temp\Dannebrogsordnen.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\Dannebrogsordnen.exe"C:\Users\Admin\AppData\Local\Temp\Dannebrogsordnen.exe"2⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5dd87a973e01c5d9f8e0fcc81a0af7c7a
SHA1c9206ced48d1e5bc648b1d0f54cccc18bf643a14
SHA2567fb0f8d452fefaac789986b933df050f3d3e4feb8a8d9944ada995f572dcdca1
SHA5124910b39b1a99622ac8b3c42f173bbe7035ac2f8d40c946468e7db7e2868a2da81ea94da453857f06f39957dd690c7f1ba498936a7aaa0039975e472376f92e8f