Analysis
-
max time kernel
24s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-01-2023 15:21
Static task
static1
Behavioral task
behavioral1
Sample
9b9f771adcffa9a199b27f320a44e5c859910d380b8954fec6d521b213e2697f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9b9f771adcffa9a199b27f320a44e5c859910d380b8954fec6d521b213e2697f.exe
Resource
win10v2004-20220901-en
General
-
Target
9b9f771adcffa9a199b27f320a44e5c859910d380b8954fec6d521b213e2697f.exe
-
Size
72KB
-
MD5
3ba9d84e72bf9a0770c804a8370448b0
-
SHA1
96b6cd4ffdd19de46a2c86124b1d9b9dfdc3b30e
-
SHA256
9b9f771adcffa9a199b27f320a44e5c859910d380b8954fec6d521b213e2697f
-
SHA512
3618964e04df501426a991995323bb71e870de1371a332f497c9a2bcdc93e074ee14dec1fc7cc98897ccb7e92d42308e2d4995a5d7dab8daa25d5fdad673359c
-
SSDEEP
1536:UXkyV9IRvDoVCaGYqAWb0kXT0dAzWeY9eTX:U0yVhVtdo0kTwA6eJT
Malware Config
Extracted
guloader
https://drive.google.com/uc?export=download&id=1IcgRkH-13Pdb-rv82N2a7e7yZkhqmCUB
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Guloader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1532-56-0x00000000003F0000-0x00000000003FB000-memory.dmp family_guloader -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
9b9f771adcffa9a199b27f320a44e5c859910d380b8954fec6d521b213e2697f.exepid process 1532 9b9f771adcffa9a199b27f320a44e5c859910d380b8954fec6d521b213e2697f.exe