Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    78s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/11/2024, 08:03

General

  • Target

    Staff Attendance Submission for Payroll Processing (July 07 - November 07, 2024) PDF.exe

  • Size

    401KB

  • MD5

    a62db3b4c45f6012c0951c72be7e339a

  • SHA1

    635ddbd1e2884f847fa3e60fd547e8dc958af4d1

  • SHA256

    82f6981ed7bd0008afe2369debe26bfd84d7e9ee5d54e4741ebb3e29c3794e8e

  • SHA512

    f2f72f9ebae0339adba033689e42d9eb7ad7c79ed759c01283c5d1ec2bf24e2a983ba495fec3d5ec14c40f97ccd4c86e155822fb3e5400057f16c3a9a32625c7

  • SSDEEP

    12288:z0m2XWPUR9fBnEwEe6V0Lu6eRmwVbVsCI/:ujvZnEdfgegwVbVsX

Malware Config

Signatures

  • Guloader family
  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Loads dropped DLL 2 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Staff Attendance Submission for Payroll Processing (July 07 - November 07, 2024) PDF.exe
    "C:\Users\Admin\AppData\Local\Temp\Staff Attendance Submission for Payroll Processing (July 07 - November 07, 2024) PDF.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:3892
    • C:\Users\Admin\AppData\Local\Temp\Staff Attendance Submission for Payroll Processing (July 07 - November 07, 2024) PDF.exe
      "C:\Users\Admin\AppData\Local\Temp\Staff Attendance Submission for Payroll Processing (July 07 - November 07, 2024) PDF.exe"
      2⤵
      • Suspicious use of NtCreateThreadExHideFromDebugger
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nstDB8C.tmp\System.dll

    Filesize

    11KB

    MD5

    34442e1e0c2870341df55e1b7b3cccdc

    SHA1

    99b2fa21aead4b6ccd8ff2f6d3d3453a51d9c70c

    SHA256

    269d232712c86983336badb40b9e55e80052d8389ed095ebf9214964d43b6bb1

    SHA512

    4a8c57fb12997438b488b862f3fc9dc0f236e07bb47b2bce6053dcb03ac7ad171842f02ac749f02dda4719c681d186330524cd2953d33cb50854844e74b33d51

  • memory/1508-42-0x0000000077741000-0x0000000077861000-memory.dmp

    Filesize

    1.1MB

  • memory/1508-41-0x0000000000400000-0x0000000001654000-memory.dmp

    Filesize

    18.3MB

  • memory/1508-48-0x0000000001660000-0x00000000030B6000-memory.dmp

    Filesize

    26.3MB

  • memory/1508-47-0x0000000000400000-0x0000000001654000-memory.dmp

    Filesize

    18.3MB

  • memory/1508-28-0x0000000000400000-0x0000000001654000-memory.dmp

    Filesize

    18.3MB

  • memory/1508-30-0x0000000001660000-0x00000000030B6000-memory.dmp

    Filesize

    26.3MB

  • memory/1508-43-0x0000000000400000-0x0000000001654000-memory.dmp

    Filesize

    18.3MB

  • memory/1508-39-0x0000000001660000-0x00000000030B6000-memory.dmp

    Filesize

    26.3MB

  • memory/1508-31-0x00000000777C8000-0x00000000777C9000-memory.dmp

    Filesize

    4KB

  • memory/1508-40-0x0000000000400000-0x0000000001654000-memory.dmp

    Filesize

    18.3MB

  • memory/1508-32-0x00000000777E5000-0x00000000777E6000-memory.dmp

    Filesize

    4KB

  • memory/3892-25-0x0000000004210000-0x0000000005C66000-memory.dmp

    Filesize

    26.3MB

  • memory/3892-26-0x0000000077741000-0x0000000077861000-memory.dmp

    Filesize

    1.1MB

  • memory/3892-29-0x0000000004210000-0x0000000005C66000-memory.dmp

    Filesize

    26.3MB

  • memory/3892-27-0x0000000074394000-0x0000000074395000-memory.dmp

    Filesize

    4KB