Overview
overview
10Static
static
353d1be737d...3N.exe
windows7-x64
1053d1be737d...3N.exe
windows10-2004-x64
10$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 12:42
Static task
static1
Behavioral task
behavioral1
Sample
53d1be737d25b9bf45fec95665582a569b3e2fee7f9e188cacec22b0ff212093N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
53d1be737d25b9bf45fec95665582a569b3e2fee7f9e188cacec22b0ff212093N.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/AdvSplash.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/AdvSplash.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20241007-en
General
-
Target
53d1be737d25b9bf45fec95665582a569b3e2fee7f9e188cacec22b0ff212093N.exe
-
Size
1010KB
-
MD5
99815ed08ddbc13eb635f1a2534cbfb0
-
SHA1
bbf3c832c86a824e5fc7c63a9007c4eab1c38470
-
SHA256
53d1be737d25b9bf45fec95665582a569b3e2fee7f9e188cacec22b0ff212093
-
SHA512
5bd32be0d83a0c6e531256ba98ae8f8d7b6803c540f5af409212e79cdd72e8cded4ebae6e3bf8f0f68841aeb0b37f342cdbd29791c47469d0f13abee1a00ce72
-
SSDEEP
24576:pTqMPCpufeCqenzhTRfX6ahX1DCb+H+JKjZMWSg:pTZPCwfeEnxRXhXNCqpVM5g
Malware Config
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Loads dropped DLL 5 IoCs
pid Process 2240 53d1be737d25b9bf45fec95665582a569b3e2fee7f9e188cacec22b0ff212093N.exe 2240 53d1be737d25b9bf45fec95665582a569b3e2fee7f9e188cacec22b0ff212093N.exe 2240 53d1be737d25b9bf45fec95665582a569b3e2fee7f9e188cacec22b0ff212093N.exe 2240 53d1be737d25b9bf45fec95665582a569b3e2fee7f9e188cacec22b0ff212093N.exe 2240 53d1be737d25b9bf45fec95665582a569b3e2fee7f9e188cacec22b0ff212093N.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 drive.google.com 5 drive.google.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2240 53d1be737d25b9bf45fec95665582a569b3e2fee7f9e188cacec22b0ff212093N.exe 2824 caspol.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2240 set thread context of 2824 2240 53d1be737d25b9bf45fec95665582a569b3e2fee7f9e188cacec22b0ff212093N.exe 31 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\deaktiveringernes\ironist.lnk 53d1be737d25b9bf45fec95665582a569b3e2fee7f9e188cacec22b0ff212093N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\vulcanizer\hovedrollens.ini 53d1be737d25b9bf45fec95665582a569b3e2fee7f9e188cacec22b0ff212093N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caspol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53d1be737d25b9bf45fec95665582a569b3e2fee7f9e188cacec22b0ff212093N.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2240 53d1be737d25b9bf45fec95665582a569b3e2fee7f9e188cacec22b0ff212093N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2824 2240 53d1be737d25b9bf45fec95665582a569b3e2fee7f9e188cacec22b0ff212093N.exe 31 PID 2240 wrote to memory of 2824 2240 53d1be737d25b9bf45fec95665582a569b3e2fee7f9e188cacec22b0ff212093N.exe 31 PID 2240 wrote to memory of 2824 2240 53d1be737d25b9bf45fec95665582a569b3e2fee7f9e188cacec22b0ff212093N.exe 31 PID 2240 wrote to memory of 2824 2240 53d1be737d25b9bf45fec95665582a569b3e2fee7f9e188cacec22b0ff212093N.exe 31 PID 2240 wrote to memory of 2824 2240 53d1be737d25b9bf45fec95665582a569b3e2fee7f9e188cacec22b0ff212093N.exe 31 PID 2240 wrote to memory of 2824 2240 53d1be737d25b9bf45fec95665582a569b3e2fee7f9e188cacec22b0ff212093N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\53d1be737d25b9bf45fec95665582a569b3e2fee7f9e188cacec22b0ff212093N.exe"C:\Users\Admin\AppData\Local\Temp\53d1be737d25b9bf45fec95665582a569b3e2fee7f9e188cacec22b0ff212093N.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe"C:\Users\Admin\AppData\Local\Temp\53d1be737d25b9bf45fec95665582a569b3e2fee7f9e188cacec22b0ff212093N.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD51871af84805057b5ebc05ee46b56625d
SHA150e1c315ad30f5f3f300c7cd9dd0d5d626fe0167
SHA25662b3db0446750ca9fd693733eec927acc1f50012a47785343286e63b650b7621
SHA512c1979ee98dfdb807776c439218528d80b4b244a87e692f1538e40f9c2c82db8b77485eb1429325b6f44419bf1f4cd454e43ff381eff077a8b4f4d9eb0d7e54d4
-
Filesize
12KB
MD5564bb0373067e1785cba7e4c24aab4bf
SHA17c9416a01d821b10b2eef97b80899d24014d6fc1
SHA2567a9ddee34562cd3703f1502b5c70e99cd5bba15de2b6845a3555033d7f6cb2a5
SHA51222c61a323cb9293d7ec5c7e7e60674d0e2f7b29d55be25eb3c128ea2cd7440a1400cee17c43896b996278007c0d247f331a9b8964e3a40a0eb1404a9596c4472
-
Filesize
9KB
MD548f3e7860e1de2b4e63ec744a5e9582a
SHA1420c64d802a637c75a53efc8f748e1aede3d6dc6
SHA2566bf9cccd8a600f4d442efe201e8c07b49605ba35f49a4b3ab22fa2641748e156
SHA51228716ddea580eeb23d93d1ff6ea0cf79a725e13c8f8a17ec9dfacb1fe29c7981ad84c03aed05663adc52365d63d19ec2f366762d1c685e3a9d93037570c3c583
-
Filesize
7KB
MD54c77a65bb121bb7f2910c1fa3cb38337
SHA194531e3c6255125c1a85653174737d275bc35838
SHA2565e66489393f159aa0fd30b630bb345d03418e9324e7d834b2e4195865a637cfe
SHA512df50eadf312469c56996c67007d31b85d00e91a4f40355e786536fc0336ac9c2fd8ad9df6e65ab390cc6f031aca28c92212ea23cc40eb600b82a63be3b5b8c04