Analysis
-
max time kernel
146s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 19:59
Static task
static1
Behavioral task
behavioral1
Sample
ATTACHED ORIGINAL REF __NOTE.exe
Resource
win7-20241023-en
General
-
Target
ATTACHED ORIGINAL REF __NOTE.exe
-
Size
252KB
-
MD5
995a9f0d72ee6407f3979543930d80ae
-
SHA1
8e38d89ab142ccbfb95952f873f49df56ab65055
-
SHA256
77a74587d301dfd79d5c60a874ac580e83c389e8566261f60b09d87cdffa2e38
-
SHA512
f72e8016c05880bc5a338266e5f4859b88c3c66b262264ce48fb30ca4efbf53eb6101579f46c4f83794ebb332a78e45bda8088b9707454b959a640b0b3278f1e
-
SSDEEP
3072:A1p9M3scGOWyLvr1f+lwYuJIVPUVJXgcAm6S6l7g98HimFx1zeBgxX:3nG1eJffYuJ4cVdx36Fl7U8mBe
Malware Config
Extracted
guloader
https://drive.google.com/uc?export=download&id=1-7CEqaIs0xr7KeLf1RsQKlZCjSlB91Jb
Extracted
xloader
2.3
i8be
cdymjim.icu
globalmilitaryaircraft.com
slusheestore.com
freepdfconvert.net
itadsweden.com
legenddocs.com
metholyptus.com
966cm.com
mobilitygloves-protect.com
travaze.net
go-kalisa.com
believehavefaith.com
nywebhost.com
semitsol.com
wowyuu.net
cochesb2b.com
gobesttobuy.com
senmec23.com
bmsgw.com
newazenterprise.com
onlinefitnessmechanic.com
makeournationsafeagain.com
climat2020.com
hamsikoysutlaci.net
networkslice.com
wanganwanderer1.com
nationwidesignage.com
lucianmediazone.com
geekyweel.com
hzky888.com
mcfarlaneweb.com
c-w3.com
covidstracking.com
flowingwealth.com
sprinklesglobal.com
secret-mall.com
extraclasss.com
stasiapl.com
1905vintage.com
8649gb.com
brisketbeard.com
optionsafecode.com
foms4om.com
differentquartz.info
freshly.pizza
levettfyneralhome.com
leteeshirtboutique.com
creativesdanfe.com
t-oils.com
seoforamz.com
carbon2algae.com
kronospros.com
storepisode.com
viautong30.com
weipr.net
mjspizzaandwinghouse.com
e-yzr.com
webcamthing.com
wb917.com
sedentariocero.com
salon-solution.com
solgeneration.com
viviennevaile.com
weightlossbiloxi.com
innovativevan.com
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Xloader family
-
Xloader payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2172-33-0x0000000000400000-0x0000000000553000-memory.dmp xloader behavioral1/memory/2172-37-0x0000000000400000-0x0000000000553000-memory.dmp xloader behavioral1/memory/2768-41-0x0000000000080000-0x00000000000A8000-memory.dmp xloader -
Checks QEMU agent file 2 TTPs 2 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
Processes:
ATTACHED ORIGINAL REF __NOTE.exeATTACHED ORIGINAL REF __NOTE.exedescription ioc process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe ATTACHED ORIGINAL REF __NOTE.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe ATTACHED ORIGINAL REF __NOTE.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2016 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
ATTACHED ORIGINAL REF __NOTE.exeATTACHED ORIGINAL REF __NOTE.exepid process 1628 ATTACHED ORIGINAL REF __NOTE.exe 2172 ATTACHED ORIGINAL REF __NOTE.exe 2172 ATTACHED ORIGINAL REF __NOTE.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
ATTACHED ORIGINAL REF __NOTE.exeATTACHED ORIGINAL REF __NOTE.exemstsc.exedescription pid process target process PID 1628 set thread context of 2172 1628 ATTACHED ORIGINAL REF __NOTE.exe ATTACHED ORIGINAL REF __NOTE.exe PID 2172 set thread context of 1212 2172 ATTACHED ORIGINAL REF __NOTE.exe Explorer.EXE PID 2768 set thread context of 1212 2768 mstsc.exe Explorer.EXE -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ATTACHED ORIGINAL REF __NOTE.exeATTACHED ORIGINAL REF __NOTE.exemstsc.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ATTACHED ORIGINAL REF __NOTE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ATTACHED ORIGINAL REF __NOTE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
ATTACHED ORIGINAL REF __NOTE.exemstsc.exepid process 2172 ATTACHED ORIGINAL REF __NOTE.exe 2172 ATTACHED ORIGINAL REF __NOTE.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe 2768 mstsc.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
ATTACHED ORIGINAL REF __NOTE.exeATTACHED ORIGINAL REF __NOTE.exemstsc.exepid process 1628 ATTACHED ORIGINAL REF __NOTE.exe 2172 ATTACHED ORIGINAL REF __NOTE.exe 2172 ATTACHED ORIGINAL REF __NOTE.exe 2172 ATTACHED ORIGINAL REF __NOTE.exe 2768 mstsc.exe 2768 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
ATTACHED ORIGINAL REF __NOTE.exemstsc.exedescription pid process Token: SeDebugPrivilege 2172 ATTACHED ORIGINAL REF __NOTE.exe Token: SeDebugPrivilege 2768 mstsc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
ATTACHED ORIGINAL REF __NOTE.exepid process 1628 ATTACHED ORIGINAL REF __NOTE.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
ATTACHED ORIGINAL REF __NOTE.exeExplorer.EXEmstsc.exedescription pid process target process PID 1628 wrote to memory of 2172 1628 ATTACHED ORIGINAL REF __NOTE.exe ATTACHED ORIGINAL REF __NOTE.exe PID 1628 wrote to memory of 2172 1628 ATTACHED ORIGINAL REF __NOTE.exe ATTACHED ORIGINAL REF __NOTE.exe PID 1628 wrote to memory of 2172 1628 ATTACHED ORIGINAL REF __NOTE.exe ATTACHED ORIGINAL REF __NOTE.exe PID 1628 wrote to memory of 2172 1628 ATTACHED ORIGINAL REF __NOTE.exe ATTACHED ORIGINAL REF __NOTE.exe PID 1628 wrote to memory of 2172 1628 ATTACHED ORIGINAL REF __NOTE.exe ATTACHED ORIGINAL REF __NOTE.exe PID 1212 wrote to memory of 2768 1212 Explorer.EXE mstsc.exe PID 1212 wrote to memory of 2768 1212 Explorer.EXE mstsc.exe PID 1212 wrote to memory of 2768 1212 Explorer.EXE mstsc.exe PID 1212 wrote to memory of 2768 1212 Explorer.EXE mstsc.exe PID 2768 wrote to memory of 2016 2768 mstsc.exe cmd.exe PID 2768 wrote to memory of 2016 2768 mstsc.exe cmd.exe PID 2768 wrote to memory of 2016 2768 mstsc.exe cmd.exe PID 2768 wrote to memory of 2016 2768 mstsc.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\ATTACHED ORIGINAL REF __NOTE.exe"C:\Users\Admin\AppData\Local\Temp\ATTACHED ORIGINAL REF __NOTE.exe"2⤵
- Checks QEMU agent file
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\ATTACHED ORIGINAL REF __NOTE.exe"C:\Users\Admin\AppData\Local\Temp\ATTACHED ORIGINAL REF __NOTE.exe"3⤵
- Checks QEMU agent file
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2172
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\ATTACHED ORIGINAL REF __NOTE.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2016
-
-