Malware Analysis Report

2024-12-06 03:20

Sample ID 241024-q9qdjsydqa
Target Carnosin.exe
SHA256 b16b79b8bcb55f71e7968e33ca0c72361550c2229570e08c4f20ec9f8dfdfc7c
Tags
discovery guloader downloader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

b16b79b8bcb55f71e7968e33ca0c72361550c2229570e08c4f20ec9f8dfdfc7c

Threat Level: Known bad

The file Carnosin.exe was found to be: Known bad.

Malicious Activity Summary

discovery guloader downloader

Guloader,Cloudeye

Loads dropped DLL

Legitimate hosting services abused for malware hosting/C2

Drops file in System32 directory

Drops file in Windows directory

Enumerates physical storage devices

System Location Discovery: System Language Discovery

Unsigned PE

NSIS installer

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-10-24 13:57

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

NSIS installer

installer
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-10-24 13:57

Reported

2024-10-24 14:00

Platform

win7-20241010-en

Max time kernel

115s

Max time network

19s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Carnosin.exe"

Signatures

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Carnosin.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Carnosin.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\oecus\svante.Eft C:\Users\Admin\AppData\Local\Temp\Carnosin.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\resources\sankthansaftnerne\clodpoll.saf C:\Users\Admin\AppData\Local\Temp\Carnosin.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\Carnosin.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Carnosin.exe

"C:\Users\Admin\AppData\Local\Temp\Carnosin.exe"

Network

N/A

Files

C:\Users\Admin\Desktop\peripheries.lnk

MD5 1b5dba842f7f0d5f0a1c9fdfb670bfa8
SHA1 9dd9bf5e0eb756ab8dbdec0869b6b156700fc5bd
SHA256 3cdd4d8bb60d898851735427e4ea085161c09194da3dec593c1868cf59dbcebd
SHA512 f7bb2b820bfb352e769dc5991c13b769cc57d5e7c039cfccc223b90cc3c4068b70606ed210be80cb3441061c6c417bea788c03fb2cfc5ac3c5db7c6f741a59de

\Users\Admin\AppData\Local\Temp\nse6681.tmp\System.dll

MD5 cf85183b87314359488b850f9e97a698
SHA1 6b6c790037eec7ebea4d05590359cb4473f19aea
SHA256 3b6a5cb2a3c091814fce297c04fb677f72732fb21615102c62a195fdc2e7dfac
SHA512 fe484b3fc89aeed3a6b71b90b90ea11a787697e56be3077154b6ddc2646850f6c38589ed422ff792e391638a80a778d33f22e891e76b5d65896c6fb4696a2c3b

memory/1996-24644-0x0000000002F90000-0x00000000046AD000-memory.dmp

memory/1996-24645-0x0000000002F90000-0x00000000046AD000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-10-24 13:57

Reported

2024-10-24 19:07

Platform

win10v2004-20241007-en

Max time kernel

16s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Carnosin.exe"

Signatures

Guloader,Cloudeye

downloader guloader

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Carnosin.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Carnosin.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A drive.google.com N/A N/A
N/A drive.google.com N/A N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\oecus\svante.Eft C:\Users\Admin\AppData\Local\Temp\Carnosin.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\resources\sankthansaftnerne\clodpoll.saf C:\Users\Admin\AppData\Local\Temp\Carnosin.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\Carnosin.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Carnosin.exe

"C:\Users\Admin\AppData\Local\Temp\Carnosin.exe"

C:\Users\Admin\AppData\Local\Temp\Carnosin.exe

"C:\Users\Admin\AppData\Local\Temp\Carnosin.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 0.205.248.87.in-addr.arpa udp
US 8.8.8.8:53 76.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 53.210.109.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 drive.google.com udp
GB 142.250.179.238:443 drive.google.com tcp
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.180.3:80 c.pki.goog tcp
US 8.8.8.8:53 o.pki.goog udp
GB 142.250.180.3:80 o.pki.goog tcp
US 8.8.8.8:53 drive.usercontent.google.com udp
GB 142.250.187.193:443 drive.usercontent.google.com tcp
US 8.8.8.8:53 238.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 3.180.250.142.in-addr.arpa udp
US 8.8.8.8:53 193.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 101.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 84.65.42.20.in-addr.arpa udp

Files

C:\Users\Admin\Desktop\peripheries.lnk

MD5 cb22b85e23d1d5d456410baa07cdec53
SHA1 cafa83e1a5e8dd209cd032774474c50f7c7e4a5b
SHA256 03f9d8e7d4d738722029eff44b70734152d06925c2ed63e7fd49ea5879078f8f
SHA512 22b0cf77238fe1459c162b01a55627866d59b01844d2409d37788595267a88287a51acb544cafb5883f47ed023614e3b97e0614fb0c1335c2365f76699725c30

C:\Users\Admin\AppData\Local\Temp\nsw7C65.tmp\System.dll

MD5 cf85183b87314359488b850f9e97a698
SHA1 6b6c790037eec7ebea4d05590359cb4473f19aea
SHA256 3b6a5cb2a3c091814fce297c04fb677f72732fb21615102c62a195fdc2e7dfac
SHA512 fe484b3fc89aeed3a6b71b90b90ea11a787697e56be3077154b6ddc2646850f6c38589ed422ff792e391638a80a778d33f22e891e76b5d65896c6fb4696a2c3b

memory/1732-24644-0x0000000003420000-0x0000000004B3D000-memory.dmp

memory/1732-24645-0x00000000771E1000-0x0000000077301000-memory.dmp

memory/1732-24646-0x0000000010004000-0x0000000010005000-memory.dmp

memory/1732-24648-0x0000000003420000-0x0000000004B3D000-memory.dmp

memory/3772-24649-0x0000000001660000-0x0000000002D7D000-memory.dmp

memory/3772-24647-0x0000000000400000-0x0000000001654000-memory.dmp

memory/3772-24650-0x0000000077268000-0x0000000077269000-memory.dmp

memory/3772-24651-0x0000000077285000-0x0000000077286000-memory.dmp

memory/3772-24665-0x0000000000401000-0x0000000000404000-memory.dmp

memory/3772-24664-0x0000000000400000-0x0000000001654000-memory.dmp

memory/3772-24666-0x0000000001660000-0x0000000002D7D000-memory.dmp

memory/3772-24667-0x00000000771E1000-0x0000000077301000-memory.dmp

memory/3772-24668-0x0000000000400000-0x0000000001654000-memory.dmp

memory/3772-24669-0x0000000000400000-0x0000000001654000-memory.dmp

memory/3772-24670-0x0000000000401000-0x0000000000404000-memory.dmp

memory/3772-24671-0x0000000000400000-0x0000000001654000-memory.dmp

memory/3772-24672-0x0000000000400000-0x0000000001654000-memory.dmp

memory/3772-24673-0x0000000000400000-0x0000000001654000-memory.dmp

memory/3772-24674-0x0000000000400000-0x0000000001654000-memory.dmp

memory/3772-24677-0x0000000000400000-0x0000000001654000-memory.dmp