Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
23-07-2021 20:21
Static task
static1
Behavioral task
behavioral1
Sample
test4.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
test4.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
test4.exe
-
Size
176KB
-
MD5
27d1dc133fb8cf29067312b892d5d41b
-
SHA1
b38309c3529fa56ba66f9fecf82e0793f45c36b1
-
SHA256
ab0b9dd6b306003497fbf6425b4fd9db90e4d0eed37cc5cce62852f8509fedcf
-
SHA512
8b314d1b07f71e9f3eddebf498a7b28d0afb0d66b4a6b321dde7a10ba3798538e02cff07ffea16f46963b96a524df8755b994bd7487318276d2f9c867e54cda7
Score
10/10
Malware Config
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
test4.exepid process 1688 test4.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1688-62-0x0000000000300000-0x0000000000312000-memory.dmpFilesize
72KB