Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29-01-2023 17:42
Static task
static1
Behavioral task
behavioral1
Sample
8dc22051b3b116993095315408c14d174c2940288459d9f08b7748ce766d159d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8dc22051b3b116993095315408c14d174c2940288459d9f08b7748ce766d159d.exe
Resource
win10v2004-20221111-en
General
-
Target
8dc22051b3b116993095315408c14d174c2940288459d9f08b7748ce766d159d.exe
-
Size
72KB
-
MD5
9637ed14979db65038feef4198e52dd1
-
SHA1
2b4e7ff68836b91dce0cd8cf34ead1136bd6fe84
-
SHA256
8dc22051b3b116993095315408c14d174c2940288459d9f08b7748ce766d159d
-
SHA512
e1958a332a865e1fc5ea9388fe839182477f936a26bf5a82b4d231a8fd3397892aa64f7b10a6757b5ae0058e0c66266f095f94566d2e60d56ef5bca4224d24db
-
SSDEEP
1536:KDsqCVErgbEQ9RwK5aAcFYkKGuF+lQNYql/D:KYqCUgbEwR7RcFYkKGuF2QNx/
Malware Config
Extracted
guloader
https://drive.google.com/uc?export=download&id=1ZHj4dLvE53vort3O5aUec7FCICQviii2
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Guloader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2024-56-0x0000000000280000-0x000000000028B000-memory.dmp family_guloader -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
8dc22051b3b116993095315408c14d174c2940288459d9f08b7748ce766d159d.exepid process 2024 8dc22051b3b116993095315408c14d174c2940288459d9f08b7748ce766d159d.exe