Analysis
-
max time kernel
147s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 22:32
Static task
static1
Behavioral task
behavioral1
Sample
PO 00009876660887666000.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
PO 00009876660887666000.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Ergmeter/Lakkendes.app
Resource
macos-20241106-en
General
-
Target
PO 00009876660887666000.exe
-
Size
756KB
-
MD5
a17e477f9d45342182f01cac527c0c1f
-
SHA1
403e5d7d981f01b967e36dd98e06e70c9d7acf0c
-
SHA256
783b5b92ea44666e1521eed1d7688f1bdf9044e83ac39258f9905397f52677dd
-
SHA512
d3d8d4cf712a175ca0d61b44cab482d49166c15228c04c5c1da0984f80c40a9f848a2407f8696a660d6567ee1ee7468bbd95b1876f891be68a5028a2477c849a
-
SSDEEP
12288:52SLJDgeOPVpmYLlKmxvIv2NeXLoSIlAz44XsZZqStdNx57YDXmpcD:5hLJwrmSsmqv2Ne7oSZMX7jftYD2uD
Malware Config
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Loads dropped DLL 1 IoCs
Processes:
PO 00009876660887666000.exepid process 732 PO 00009876660887666000.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
powershell.exewabmig.exepid process 2508 powershell.exe 428 wabmig.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 2508 set thread context of 428 2508 powershell.exe wabmig.exe -
Drops file in Program Files directory 1 IoCs
Processes:
PO 00009876660887666000.exedescription ioc process File opened for modification C:\Program Files (x86)\Triolein\uropfrelsen.tir PO 00009876660887666000.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
powershell.exewabmig.exePO 00009876660887666000.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wabmig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO 00009876660887666000.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
powershell.exepid process 2508 powershell.exe 2508 powershell.exe 2508 powershell.exe 2508 powershell.exe 2508 powershell.exe 2508 powershell.exe 2508 powershell.exe 2508 powershell.exe 2508 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
powershell.exepid process 2508 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2508 powershell.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
PO 00009876660887666000.exepowershell.exedescription pid process target process PID 732 wrote to memory of 2508 732 PO 00009876660887666000.exe powershell.exe PID 732 wrote to memory of 2508 732 PO 00009876660887666000.exe powershell.exe PID 732 wrote to memory of 2508 732 PO 00009876660887666000.exe powershell.exe PID 2508 wrote to memory of 428 2508 powershell.exe wabmig.exe PID 2508 wrote to memory of 428 2508 powershell.exe wabmig.exe PID 2508 wrote to memory of 428 2508 powershell.exe wabmig.exe PID 2508 wrote to memory of 428 2508 powershell.exe wabmig.exe PID 2508 wrote to memory of 428 2508 powershell.exe wabmig.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO 00009876660887666000.exe"C:\Users\Admin\AppData\Local\Temp\PO 00009876660887666000.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle minimized "$Oem=Get-Content 'C:\Users\Admin\AppData\Roaming\djellabaer\Champagnizing183.Ret86';$Skydeklar93=$Oem.SubString(53372,3);.$Skydeklar93($Oem)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Program Files (x86)\windows mail\wabmig.exe"C:\Program Files (x86)\windows mail\wabmig.exe"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:428
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
6KB
MD53d366250fcf8b755fce575c75f8c79e4
SHA12ebac7df78154738d41aac8e27d7a0e482845c57
SHA2568bdd996ae4778c6f829e2bcb651c55efc9ec37eeea17d259e013b39528dddbb6
SHA51267d2d88de625227ccd2cb406b4ac3a215d1770d385c985a44e2285490f49b45f23ce64745b24444e2a0f581335fda02e913b92781043e8dfd287844435ba9094
-
Filesize
52KB
MD5e7c25fcd57bcd42038143a6928274367
SHA1ccfab30faef7de037ae6bcfdd144a2e6b10b1455
SHA256187adbae17615b37ae386ebadb4347a41f2a3e994939e832e96f342d91f9d916
SHA5121ead97118d2c03e5ddf13412dfa2477c3f11ecbda54ba7439d24206c0f5cffb80581b47ef0ab32cf8b35e8a089f78fb84792b8e154b1e10a3a7e29f914c77969
-
Filesize
323KB
MD5c63b35457e3f441b055e33bf5fefe527
SHA1a667f3c9aab680e32649c448a82acfc6248547ee
SHA2565fb4c0b14e27e026650eac4da2101b83d70c3a39f8cc008ab5e5c4fcd7837b00
SHA5123532bbc907ca4a2633550d9eff54325108d8592413138b3397014ae50e13c03cf7f96595dfa42350ee966c1b1e329c7a4e810a019d77c08a7045c4f28d70ba34