Analysis
-
max time kernel
146s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 19:59
Static task
static1
Behavioral task
behavioral1
Sample
ATTACHED ORIGINAL REF __NOTE.exe
Resource
win7-20241023-en
General
-
Target
ATTACHED ORIGINAL REF __NOTE.exe
-
Size
252KB
-
MD5
995a9f0d72ee6407f3979543930d80ae
-
SHA1
8e38d89ab142ccbfb95952f873f49df56ab65055
-
SHA256
77a74587d301dfd79d5c60a874ac580e83c389e8566261f60b09d87cdffa2e38
-
SHA512
f72e8016c05880bc5a338266e5f4859b88c3c66b262264ce48fb30ca4efbf53eb6101579f46c4f83794ebb332a78e45bda8088b9707454b959a640b0b3278f1e
-
SSDEEP
3072:A1p9M3scGOWyLvr1f+lwYuJIVPUVJXgcAm6S6l7g98HimFx1zeBgxX:3nG1eJffYuJ4cVdx36Fl7U8mBe
Malware Config
Extracted
guloader
https://drive.google.com/uc?export=download&id=1-7CEqaIs0xr7KeLf1RsQKlZCjSlB91Jb
Extracted
xloader
2.3
i8be
cdymjim.icu
globalmilitaryaircraft.com
slusheestore.com
freepdfconvert.net
itadsweden.com
legenddocs.com
metholyptus.com
966cm.com
mobilitygloves-protect.com
travaze.net
go-kalisa.com
believehavefaith.com
nywebhost.com
semitsol.com
wowyuu.net
cochesb2b.com
gobesttobuy.com
senmec23.com
bmsgw.com
newazenterprise.com
onlinefitnessmechanic.com
makeournationsafeagain.com
climat2020.com
hamsikoysutlaci.net
networkslice.com
wanganwanderer1.com
nationwidesignage.com
lucianmediazone.com
geekyweel.com
hzky888.com
mcfarlaneweb.com
c-w3.com
covidstracking.com
flowingwealth.com
sprinklesglobal.com
secret-mall.com
extraclasss.com
stasiapl.com
1905vintage.com
8649gb.com
brisketbeard.com
optionsafecode.com
foms4om.com
differentquartz.info
freshly.pizza
levettfyneralhome.com
leteeshirtboutique.com
creativesdanfe.com
t-oils.com
seoforamz.com
carbon2algae.com
kronospros.com
storepisode.com
viautong30.com
weipr.net
mjspizzaandwinghouse.com
e-yzr.com
webcamthing.com
wb917.com
sedentariocero.com
salon-solution.com
solgeneration.com
viviennevaile.com
weightlossbiloxi.com
innovativevan.com
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2172-33-0x0000000000400000-0x0000000000553000-memory.dmp xloader behavioral1/memory/2172-37-0x0000000000400000-0x0000000000553000-memory.dmp xloader behavioral1/memory/2768-41-0x0000000000080000-0x00000000000A8000-memory.dmp xloader -
Checks QEMU agent file 2 TTPs 2 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
description ioc Process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe ATTACHED ORIGINAL REF __NOTE.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe ATTACHED ORIGINAL REF __NOTE.exe -
Deletes itself 1 IoCs
pid Process 2016 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 drive.google.com 5 drive.google.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 1628 ATTACHED ORIGINAL REF __NOTE.exe 2172 ATTACHED ORIGINAL REF __NOTE.exe 2172 ATTACHED ORIGINAL REF __NOTE.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1628 set thread context of 2172 1628 ATTACHED ORIGINAL REF __NOTE.exe 31 PID 2172 set thread context of 1212 2172 ATTACHED ORIGINAL REF __NOTE.exe 21 PID 2768 set thread context of 1212 2768 mstsc.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ATTACHED ORIGINAL REF __NOTE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ATTACHED ORIGINAL REF __NOTE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 2172 ATTACHED ORIGINAL REF __NOTE.exe 2172 ATTACHED ORIGINAL REF __NOTE.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1628 ATTACHED ORIGINAL REF __NOTE.exe 2172 ATTACHED ORIGINAL REF __NOTE.exe 2172 ATTACHED ORIGINAL REF __NOTE.exe 2172 ATTACHED ORIGINAL REF __NOTE.exe 2768 mstsc.exe 2768 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2172 ATTACHED ORIGINAL REF __NOTE.exe Token: SeDebugPrivilege 2768 mstsc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1628 ATTACHED ORIGINAL REF __NOTE.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2172 1628 ATTACHED ORIGINAL REF __NOTE.exe 31 PID 1628 wrote to memory of 2172 1628 ATTACHED ORIGINAL REF __NOTE.exe 31 PID 1628 wrote to memory of 2172 1628 ATTACHED ORIGINAL REF __NOTE.exe 31 PID 1628 wrote to memory of 2172 1628 ATTACHED ORIGINAL REF __NOTE.exe 31 PID 1628 wrote to memory of 2172 1628 ATTACHED ORIGINAL REF __NOTE.exe 31 PID 1212 wrote to memory of 2768 1212 Explorer.EXE 33 PID 1212 wrote to memory of 2768 1212 Explorer.EXE 33 PID 1212 wrote to memory of 2768 1212 Explorer.EXE 33 PID 1212 wrote to memory of 2768 1212 Explorer.EXE 33 PID 2768 wrote to memory of 2016 2768 mstsc.exe 34 PID 2768 wrote to memory of 2016 2768 mstsc.exe 34 PID 2768 wrote to memory of 2016 2768 mstsc.exe 34 PID 2768 wrote to memory of 2016 2768 mstsc.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\ATTACHED ORIGINAL REF __NOTE.exe"C:\Users\Admin\AppData\Local\Temp\ATTACHED ORIGINAL REF __NOTE.exe"2⤵
- Checks QEMU agent file
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\ATTACHED ORIGINAL REF __NOTE.exe"C:\Users\Admin\AppData\Local\Temp\ATTACHED ORIGINAL REF __NOTE.exe"3⤵
- Checks QEMU agent file
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2172
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\ATTACHED ORIGINAL REF __NOTE.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2016
-
-