Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    20-07-2021 06:57

General

  • Target

    74ee7d7a3b3f72b77baf8752dd249511.exe

  • Size

    265KB

  • MD5

    74ee7d7a3b3f72b77baf8752dd249511

  • SHA1

    aa4fbceaa13d32e02a0f37f84316f598d18a5d66

  • SHA256

    447a0d8244572bcab27cab7d54e43ac0cd4724073d6b9deb381c78d32a97b418

  • SHA512

    1846cba7811125a54eb2e7975cac25d884a9ef83994dd47b321a03b6ff0d1b5d699e6f219c7494271ebf23186ed6e4b96f066d13509721cad2159f4fc6770be9

Score
10/10

Malware Config

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\74ee7d7a3b3f72b77baf8752dd249511.exe
    "C:\Users\Admin\AppData\Local\Temp\74ee7d7a3b3f72b77baf8752dd249511.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1756

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1756-61-0x00000000002E0000-0x00000000002EE000-memory.dmp
    Filesize

    56KB