Analysis

  • max time kernel
    11s
  • max time network
    113s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    20-07-2021 13:18

General

  • Target

    c8feb9d53b567cd1bfb0e59cf7d26bc2.exe

  • Size

    116KB

  • MD5

    c8feb9d53b567cd1bfb0e59cf7d26bc2

  • SHA1

    82a22cb59d46bae21fa4877015e163eacc04a022

  • SHA256

    642a0df15a9b8e3124d638e755f0bdbacd0d1c3ff01b59b36213a190a5e5645a

  • SHA512

    da707134a7bfdcb66389f111bb363d1e7b7260bb718d6ae999a23fc538e2065d8be766a713d8d20860e835eb21609bbbcb0d0b6c237124fa38bd2ada04acf157

Score
10/10

Malware Config

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c8feb9d53b567cd1bfb0e59cf7d26bc2.exe
    "C:\Users\Admin\AppData\Local\Temp\c8feb9d53b567cd1bfb0e59cf7d26bc2.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3904

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3904-116-0x0000000000700000-0x000000000070E000-memory.dmp
    Filesize

    56KB