Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
24-01-2022 07:27
Static task
static1
Behavioral task
behavioral1
Sample
SWIFT 09372-973012qdf.scr
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SWIFT 09372-973012qdf.scr
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
SWIFT 09372-973012qdf.scr
-
Size
140KB
-
MD5
02f9b9973a66536d93d5015277e0dd57
-
SHA1
9d6b8282756ac296a018bd11df390f1d424c2726
-
SHA256
63bd4f076246b7bcd8e2f35e88dafd43266a8468064fb7a061c4f489dd713787
-
SHA512
384b8d30a2f9fd3e027133a52ee0114971649f4b5c9e5119a941c11b36dad2e48b7d5549f53c3aa76a100c993e80acdf77c8ab7777d5949209077a73dd48f358
Score
10/10
Malware Config
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
SWIFT 09372-973012qdf.scrpid process 2472 SWIFT 09372-973012qdf.scr
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2472-117-0x00000000021D0000-0x00000000021ED000-memory.dmpFilesize
116KB