Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 19:59
Static task
static1
Behavioral task
behavioral1
Sample
ATTACHED ORIGINAL REF __NOTE.exe
Resource
win7-20241023-en
General
-
Target
ATTACHED ORIGINAL REF __NOTE.exe
-
Size
252KB
-
MD5
995a9f0d72ee6407f3979543930d80ae
-
SHA1
8e38d89ab142ccbfb95952f873f49df56ab65055
-
SHA256
77a74587d301dfd79d5c60a874ac580e83c389e8566261f60b09d87cdffa2e38
-
SHA512
f72e8016c05880bc5a338266e5f4859b88c3c66b262264ce48fb30ca4efbf53eb6101579f46c4f83794ebb332a78e45bda8088b9707454b959a640b0b3278f1e
-
SSDEEP
3072:A1p9M3scGOWyLvr1f+lwYuJIVPUVJXgcAm6S6l7g98HimFx1zeBgxX:3nG1eJffYuJ4cVdx36Fl7U8mBe
Malware Config
Extracted
guloader
https://drive.google.com/uc?export=download&id=1-7CEqaIs0xr7KeLf1RsQKlZCjSlB91Jb
Extracted
xloader
2.3
i8be
cdymjim.icu
globalmilitaryaircraft.com
slusheestore.com
freepdfconvert.net
itadsweden.com
legenddocs.com
metholyptus.com
966cm.com
mobilitygloves-protect.com
travaze.net
go-kalisa.com
believehavefaith.com
nywebhost.com
semitsol.com
wowyuu.net
cochesb2b.com
gobesttobuy.com
senmec23.com
bmsgw.com
newazenterprise.com
onlinefitnessmechanic.com
makeournationsafeagain.com
climat2020.com
hamsikoysutlaci.net
networkslice.com
wanganwanderer1.com
nationwidesignage.com
lucianmediazone.com
geekyweel.com
hzky888.com
mcfarlaneweb.com
c-w3.com
covidstracking.com
flowingwealth.com
sprinklesglobal.com
secret-mall.com
extraclasss.com
stasiapl.com
1905vintage.com
8649gb.com
brisketbeard.com
optionsafecode.com
foms4om.com
differentquartz.info
freshly.pizza
levettfyneralhome.com
leteeshirtboutique.com
creativesdanfe.com
t-oils.com
seoforamz.com
carbon2algae.com
kronospros.com
storepisode.com
viautong30.com
weipr.net
mjspizzaandwinghouse.com
e-yzr.com
webcamthing.com
wb917.com
sedentariocero.com
salon-solution.com
solgeneration.com
viviennevaile.com
weightlossbiloxi.com
innovativevan.com
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Xloader family
-
Xloader payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3736-24-0x0000000000400000-0x000000000055D000-memory.dmp xloader behavioral2/memory/3736-28-0x0000000000400000-0x000000000055D000-memory.dmp xloader behavioral2/memory/756-36-0x00000000007A0000-0x00000000007C8000-memory.dmp xloader -
Checks QEMU agent file 2 TTPs 2 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
Processes:
ATTACHED ORIGINAL REF __NOTE.exeATTACHED ORIGINAL REF __NOTE.exedescription ioc process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe ATTACHED ORIGINAL REF __NOTE.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe ATTACHED ORIGINAL REF __NOTE.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
ATTACHED ORIGINAL REF __NOTE.exeATTACHED ORIGINAL REF __NOTE.exepid process 644 ATTACHED ORIGINAL REF __NOTE.exe 3736 ATTACHED ORIGINAL REF __NOTE.exe 3736 ATTACHED ORIGINAL REF __NOTE.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
ATTACHED ORIGINAL REF __NOTE.exeATTACHED ORIGINAL REF __NOTE.exemstsc.exedescription pid process target process PID 644 set thread context of 3736 644 ATTACHED ORIGINAL REF __NOTE.exe ATTACHED ORIGINAL REF __NOTE.exe PID 3736 set thread context of 3436 3736 ATTACHED ORIGINAL REF __NOTE.exe Explorer.EXE PID 756 set thread context of 3436 756 mstsc.exe Explorer.EXE -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ATTACHED ORIGINAL REF __NOTE.exeATTACHED ORIGINAL REF __NOTE.exemstsc.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ATTACHED ORIGINAL REF __NOTE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ATTACHED ORIGINAL REF __NOTE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
Processes:
ATTACHED ORIGINAL REF __NOTE.exemstsc.exepid process 3736 ATTACHED ORIGINAL REF __NOTE.exe 3736 ATTACHED ORIGINAL REF __NOTE.exe 3736 ATTACHED ORIGINAL REF __NOTE.exe 3736 ATTACHED ORIGINAL REF __NOTE.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe 756 mstsc.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
ATTACHED ORIGINAL REF __NOTE.exeATTACHED ORIGINAL REF __NOTE.exemstsc.exepid process 644 ATTACHED ORIGINAL REF __NOTE.exe 3736 ATTACHED ORIGINAL REF __NOTE.exe 3736 ATTACHED ORIGINAL REF __NOTE.exe 3736 ATTACHED ORIGINAL REF __NOTE.exe 756 mstsc.exe 756 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
ATTACHED ORIGINAL REF __NOTE.exemstsc.exedescription pid process Token: SeDebugPrivilege 3736 ATTACHED ORIGINAL REF __NOTE.exe Token: SeDebugPrivilege 756 mstsc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
ATTACHED ORIGINAL REF __NOTE.exepid process 644 ATTACHED ORIGINAL REF __NOTE.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
ATTACHED ORIGINAL REF __NOTE.exeExplorer.EXEmstsc.exedescription pid process target process PID 644 wrote to memory of 3736 644 ATTACHED ORIGINAL REF __NOTE.exe ATTACHED ORIGINAL REF __NOTE.exe PID 644 wrote to memory of 3736 644 ATTACHED ORIGINAL REF __NOTE.exe ATTACHED ORIGINAL REF __NOTE.exe PID 644 wrote to memory of 3736 644 ATTACHED ORIGINAL REF __NOTE.exe ATTACHED ORIGINAL REF __NOTE.exe PID 644 wrote to memory of 3736 644 ATTACHED ORIGINAL REF __NOTE.exe ATTACHED ORIGINAL REF __NOTE.exe PID 3436 wrote to memory of 756 3436 Explorer.EXE mstsc.exe PID 3436 wrote to memory of 756 3436 Explorer.EXE mstsc.exe PID 3436 wrote to memory of 756 3436 Explorer.EXE mstsc.exe PID 756 wrote to memory of 3368 756 mstsc.exe cmd.exe PID 756 wrote to memory of 3368 756 mstsc.exe cmd.exe PID 756 wrote to memory of 3368 756 mstsc.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\ATTACHED ORIGINAL REF __NOTE.exe"C:\Users\Admin\AppData\Local\Temp\ATTACHED ORIGINAL REF __NOTE.exe"2⤵
- Checks QEMU agent file
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Users\Admin\AppData\Local\Temp\ATTACHED ORIGINAL REF __NOTE.exe"C:\Users\Admin\AppData\Local\Temp\ATTACHED ORIGINAL REF __NOTE.exe"3⤵
- Checks QEMU agent file
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3736
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\ATTACHED ORIGINAL REF __NOTE.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3368
-
-