Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2024 06:08
Static task
static1
Behavioral task
behavioral1
Sample
ZAMOWIEN.BAT.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
ZAMOWIEN.BAT.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
General
-
Target
ZAMOWIEN.BAT.exe
-
Size
733KB
-
MD5
2dbe82e3bc304a5b59b1b7c080464f60
-
SHA1
1db6b6aee8dc85204b14b73a526cddec8a59b700
-
SHA256
11c06f789150adb1484d8f5919399c11be0c4fbc04af20847d4dcb83cb648f02
-
SHA512
ce9001ac8aa9889eca1a4bd4638102f634bd43a80f10d7974d7c95d966d5fb575a55751dedd622b99f8ae62ba3a4c3ef9735ef9029a87b43bf7af5c6689c080c
-
SSDEEP
12288:WIE5EDEgtTeBTgQFZHmsRe3GwGw/HOHnO6LjewtuABBQqGJCUu8M:WIE5Eg6iTgEZZwGwgxjLMkun1M
Malware Config
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Loads dropped DLL 6 IoCs
Processes:
ZAMOWIEN.BAT.exepid Process 4460 ZAMOWIEN.BAT.exe 4460 ZAMOWIEN.BAT.exe 4460 ZAMOWIEN.BAT.exe 4460 ZAMOWIEN.BAT.exe 4460 ZAMOWIEN.BAT.exe 4460 ZAMOWIEN.BAT.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
Processes:
ZAMOWIEN.BAT.exepid Process 2600 ZAMOWIEN.BAT.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
ZAMOWIEN.BAT.exeZAMOWIEN.BAT.exepid Process 4460 ZAMOWIEN.BAT.exe 2600 ZAMOWIEN.BAT.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ZAMOWIEN.BAT.exedescription pid Process procid_target PID 4460 set thread context of 2600 4460 ZAMOWIEN.BAT.exe 83 -
Drops file in Program Files directory 1 IoCs
Processes:
ZAMOWIEN.BAT.exedescription ioc Process File opened for modification C:\Program Files (x86)\Common Files\Krlighedserklringers60\dehydreringerne.ini ZAMOWIEN.BAT.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ZAMOWIEN.BAT.exeZAMOWIEN.BAT.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ZAMOWIEN.BAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ZAMOWIEN.BAT.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
ZAMOWIEN.BAT.exepid Process 2600 ZAMOWIEN.BAT.exe 2600 ZAMOWIEN.BAT.exe 2600 ZAMOWIEN.BAT.exe 2600 ZAMOWIEN.BAT.exe 2600 ZAMOWIEN.BAT.exe 2600 ZAMOWIEN.BAT.exe 2600 ZAMOWIEN.BAT.exe 2600 ZAMOWIEN.BAT.exe 2600 ZAMOWIEN.BAT.exe 2600 ZAMOWIEN.BAT.exe 2600 ZAMOWIEN.BAT.exe 2600 ZAMOWIEN.BAT.exe 2600 ZAMOWIEN.BAT.exe 2600 ZAMOWIEN.BAT.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
ZAMOWIEN.BAT.exepid Process 4460 ZAMOWIEN.BAT.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
ZAMOWIEN.BAT.exedescription pid Process procid_target PID 4460 wrote to memory of 2600 4460 ZAMOWIEN.BAT.exe 83 PID 4460 wrote to memory of 2600 4460 ZAMOWIEN.BAT.exe 83 PID 4460 wrote to memory of 2600 4460 ZAMOWIEN.BAT.exe 83 PID 4460 wrote to memory of 2600 4460 ZAMOWIEN.BAT.exe 83 PID 4460 wrote to memory of 2600 4460 ZAMOWIEN.BAT.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\ZAMOWIEN.BAT.exe"C:\Users\Admin\AppData\Local\Temp\ZAMOWIEN.BAT.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\ZAMOWIEN.BAT.exe"C:\Users\Admin\AppData\Local\Temp\ZAMOWIEN.BAT.exe"2⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD550016010fb0d8db2bc4cd258ceb43be5
SHA144ba95ee12e69da72478cf358c93533a9c7a01dc
SHA25632230128c18574c1e860dfe4b17fe0334f685740e27bc182e0d525a8948c9c2e
SHA512ed4cf49f756fbf673449dca20e63dce6d3a612b61f294efc9c3ccebeffa6a1372667932468816d3a7afdb7e5a652760689d8c6d3f331cedee7247404c879a233
-
Filesize
12KB
MD54add245d4ba34b04f213409bfe504c07
SHA1ef756d6581d70e87d58cc4982e3f4d18e0ea5b09
SHA2569111099efe9d5c9b391dc132b2faf0a3851a760d4106d5368e30ac744eb42706
SHA5121bd260cabe5ea3cefbbc675162f30092ab157893510f45a1b571489e03ebb2903c55f64f89812754d3fe03c8f10012b8078d1261a7e73ac1f87c82f714bce03d