Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14-11-2024 06:16
Static task
static1
Behavioral task
behavioral1
Sample
Trykblgens.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Trykblgens.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
General
-
Target
Trykblgens.exe
-
Size
354KB
-
MD5
0f34c819b26907e1508f9cc886cd5440
-
SHA1
790d7283f25f77ad24de07368194d4266c24f051
-
SHA256
b199b1b1500796c646cfb42f1175b84b7e1493694a80bea9d5de5a0550ed4f92
-
SHA512
9b359aaa21b81d6751f3ff1061286a7118847427a07b449e2d31f5dfad55d9ce6cd958b7e70b0d62cbe1b1bb4924af2673a35049ab821d5a57657bb077f55c8d
-
SSDEEP
6144:tNDlOlZOvRQmfszRZBdhOSmhhyDRXR0OjN5c/9WG3ktHhpBnyv+bx2MTxrLM37Vh:tsZOv09dhOSmCVhjg/9WG3QBPyv+9Zt
Malware Config
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Checks QEMU agent file 2 TTPs 2 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
Processes:
Trykblgens.exeTrykblgens.exedescription ioc process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe Trykblgens.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe Trykblgens.exe -
Loads dropped DLL 1 IoCs
Processes:
Trykblgens.exepid process 752 Trykblgens.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
Trykblgens.exeTrykblgens.exepid process 752 Trykblgens.exe 2932 Trykblgens.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Trykblgens.exedescription pid process target process PID 752 set thread context of 2932 752 Trykblgens.exe Trykblgens.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Trykblgens.exeTrykblgens.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trykblgens.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trykblgens.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
Trykblgens.exepid process 752 Trykblgens.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
Trykblgens.exedescription pid process target process PID 752 wrote to memory of 2932 752 Trykblgens.exe Trykblgens.exe PID 752 wrote to memory of 2932 752 Trykblgens.exe Trykblgens.exe PID 752 wrote to memory of 2932 752 Trykblgens.exe Trykblgens.exe PID 752 wrote to memory of 2932 752 Trykblgens.exe Trykblgens.exe PID 752 wrote to memory of 2932 752 Trykblgens.exe Trykblgens.exe PID 752 wrote to memory of 2932 752 Trykblgens.exe Trykblgens.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Trykblgens.exe"C:\Users\Admin\AppData\Local\Temp\Trykblgens.exe"1⤵
- Checks QEMU agent file
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Local\Temp\Trykblgens.exe"C:\Users\Admin\AppData\Local\Temp\Trykblgens.exe"2⤵
- Checks QEMU agent file
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD58cf2ac271d7679b1d68eefc1ae0c5618
SHA17cc1caaa747ee16dc894a600a4256f64fa65a9b8
SHA2566950991102462d84fdc0e3b0ae30c95af8c192f77ce3d78e8d54e6b22f7c09ba
SHA512ce828fb9ecd7655cc4c974f78f209d3326ba71ced60171a45a437fc3fff3bd0d69a0997adaca29265c7b5419bdea2b17f8cc8ceae1b8ce6b22b7ed9120bb5ad3