Analysis

  • max time kernel
    203s
  • max time network
    203s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2024 09:02

General

  • Target

    Welfab%20Engineering%20Works%20Sdn%20Bhd%20%28605812-D%29.zip

  • Size

    502KB

  • MD5

    ce2ad77d561441eba07723e8b91fe46a

  • SHA1

    615a8b0a351db8d1188c29fa84b7230baddd3646

  • SHA256

    1e3400269bb6d96dd3029758c87bf265fc9b45eb91446da8eb1ee591a9bb2a7b

  • SHA512

    0b969c161a943426de284605f78d8b5c7c32f6eeec318417397a30de761c0c9f5605a3151195bc10292dbe05febddf00e814e85952e6fb005cabd07f8c9b7f12

  • SSDEEP

    12288:ga9wb2sRWwxk+bC5h3Im1BvtI3MJeTEbU+JN0:wxWwxFbm3ImdI36egbU+0

Malware Config

Signatures

  • Guloader family
  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Blocklisted process makes network request 5 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Welfab%20Engineering%20Works%20Sdn%20Bhd%20%28605812-D%29.zip"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4460
    • C:\Users\Admin\AppData\Local\Temp\7zOC6145FD7\Welfab Engineering Works Sdn Bhd (605812-D).exe
      "C:\Users\Admin\AppData\Local\Temp\7zOC6145FD7\Welfab Engineering Works Sdn Bhd (605812-D).exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:3152
      • C:\Windows\SysWOW64\msiexec.exe
        "C:\Users\Admin\AppData\Local\Temp\7zOC6145FD7\Welfab Engineering Works Sdn Bhd (605812-D).exe"
        3⤵
        • Adds Run key to start application
        • Blocklisted process makes network request
        • Suspicious use of NtCreateThreadExHideFromDebugger
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:3628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zOC6145FD7\Welfab Engineering Works Sdn Bhd (605812-D).exe

    Filesize

    630KB

    MD5

    fe51edf89b75291eb2212ee1b79385c8

    SHA1

    68bb65df96a0ea2043887b18d38157ea3af20f56

    SHA256

    31e42571130cdbc3a883af73f33e55f039d7e128bca5c80460f7959a393dfdef

    SHA512

    c26a4d62d0a856d1dec861fa4159231b34e38ba4b6f3dfc08c427250ccc4ecab5c8cbe1b8b3b805c2881b4984ffb4e1e07d9a4e4604b7d0b8309265e4d3b192c

  • C:\Users\Admin\AppData\Local\Temp\nsgA181.tmp\System.dll

    Filesize

    12KB

    MD5

    8cf2ac271d7679b1d68eefc1ae0c5618

    SHA1

    7cc1caaa747ee16dc894a600a4256f64fa65a9b8

    SHA256

    6950991102462d84fdc0e3b0ae30c95af8c192f77ce3d78e8d54e6b22f7c09ba

    SHA512

    ce828fb9ecd7655cc4c974f78f209d3326ba71ced60171a45a437fc3fff3bd0d69a0997adaca29265c7b5419bdea2b17f8cc8ceae1b8ce6b22b7ed9120bb5ad3

  • C:\Windows\fyldningsgrad.lnk

    Filesize

    878B

    MD5

    216219cb074dcd9ffdd2882618df1f79

    SHA1

    0add9a275e7c7177e8a3fad6599fd37ff8d52f8d

    SHA256

    8acb010365ab19ce755b137f2b2081dc2592a5bef6e4bab98ecb41b11bc1bd34

    SHA512

    d2b6ce20cd061edd7dd85114761b777ddb18d872d90bab4d7f58d293458a3d448b70f198d67be08058120aa4dcc8e7dc6eb7dabb0624bc13a9a2721211ef05aa

  • memory/3152-299-0x0000000004A10000-0x0000000006549000-memory.dmp

    Filesize

    27.2MB

  • memory/3152-300-0x0000000073AD5000-0x0000000073AD6000-memory.dmp

    Filesize

    4KB

  • memory/3152-301-0x0000000004A10000-0x0000000006549000-memory.dmp

    Filesize

    27.2MB

  • memory/3628-306-0x0000000000400000-0x00000000005E4000-memory.dmp

    Filesize

    1.9MB