Analysis
-
max time kernel
42s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01-05-2023 19:39
Behavioral task
behavioral1
Sample
GoolumzLORD.exe
Resource
win7-20230220-en
General
-
Target
GoolumzLORD.exe
-
Size
17.9MB
-
MD5
7d8645b4808b2f4ad6b4384b569e5312
-
SHA1
cf08dde92ed238640789ace28732e4fb86d67cbd
-
SHA256
63a3b644d0445018d2eea29195476c5d325ef8c8cf8a5dffea3d19635bfd4b50
-
SHA512
24d90849fe605bffc8b81c3035a4648ad714587cd93cf1408f139c3417b5bdd278bd6028929847e89df6f6be96de4cbcbf09d0bae659b2b8e4cd44e8c65412db
-
SSDEEP
393216:3u7L/xhQIhQfuuCEDLQYZk4KRiEFHmA1rFrY:3CLJRQmuCEDLQYZkZRiq1ZE
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1216 GoolumzLORD.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1356 wrote to memory of 1216 1356 GoolumzLORD.exe 27 PID 1356 wrote to memory of 1216 1356 GoolumzLORD.exe 27 PID 1356 wrote to memory of 1216 1356 GoolumzLORD.exe 27
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD55cd203d356a77646856341a0c9135fc6
SHA1a1f4ac5cc2f5ecb075b3d0129e620784814a48f7
SHA256a56afcf5f3a72769c77c3bc43c9b84197180a8b3380b6258073223bfd72ed47a
SHA512390008d57fa711d7c88b77937bf16fdb230e7c1e7182faea6d7c206e9f65ced6f2e835f9da9befb941e80624abe45875602e0e7ad485d9a009d2450a2a0e0f1f
-
Filesize
4.3MB
MD55cd203d356a77646856341a0c9135fc6
SHA1a1f4ac5cc2f5ecb075b3d0129e620784814a48f7
SHA256a56afcf5f3a72769c77c3bc43c9b84197180a8b3380b6258073223bfd72ed47a
SHA512390008d57fa711d7c88b77937bf16fdb230e7c1e7182faea6d7c206e9f65ced6f2e835f9da9befb941e80624abe45875602e0e7ad485d9a009d2450a2a0e0f1f