Analysis

  • max time kernel
    24s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    29-01-2023 15:21

General

  • Target

    9b9f771adcffa9a199b27f320a44e5c859910d380b8954fec6d521b213e2697f.exe

  • Size

    72KB

  • MD5

    3ba9d84e72bf9a0770c804a8370448b0

  • SHA1

    96b6cd4ffdd19de46a2c86124b1d9b9dfdc3b30e

  • SHA256

    9b9f771adcffa9a199b27f320a44e5c859910d380b8954fec6d521b213e2697f

  • SHA512

    3618964e04df501426a991995323bb71e870de1371a332f497c9a2bcdc93e074ee14dec1fc7cc98897ccb7e92d42308e2d4995a5d7dab8daa25d5fdad673359c

  • SSDEEP

    1536:UXkyV9IRvDoVCaGYqAWb0kXT0dAzWeY9eTX:U0yVhVtdo0kTwA6eJT

Malware Config

Extracted

Family

guloader

C2

https://drive.google.com/uc?export=download&id=1IcgRkH-13Pdb-rv82N2a7e7yZkhqmCUB

xor.base64

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Guloader payload 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9b9f771adcffa9a199b27f320a44e5c859910d380b8954fec6d521b213e2697f.exe
    "C:\Users\Admin\AppData\Local\Temp\9b9f771adcffa9a199b27f320a44e5c859910d380b8954fec6d521b213e2697f.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1532

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1532-56-0x00000000003F0000-0x00000000003FB000-memory.dmp

    Filesize

    44KB

  • memory/1532-57-0x0000000077930000-0x0000000077AD9000-memory.dmp

    Filesize

    1.7MB