Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
07/08/2023, 11:39
Static task
static1
Behavioral task
behavioral1
Sample
9f6a013645a7cc8b62bd69913aa3e4b0337157631b0c83ee49346f3fbb1f0a04.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
9f6a013645a7cc8b62bd69913aa3e4b0337157631b0c83ee49346f3fbb1f0a04.exe
Resource
win10v2004-20230703-en
General
-
Target
9f6a013645a7cc8b62bd69913aa3e4b0337157631b0c83ee49346f3fbb1f0a04.exe
-
Size
86KB
-
MD5
467f8d73b96d9dba1e2358364d40b0df
-
SHA1
a9ae40c4d5fa17b9edd8e70221352905f4a62bfb
-
SHA256
9f6a013645a7cc8b62bd69913aa3e4b0337157631b0c83ee49346f3fbb1f0a04
-
SHA512
8829ae85daae6b36a141adf2a2a0a3af1b31d96e0d9c0608b97d29f73abd7420299d1ee6476cf9d81f6a479cf01ee2546040cdfe4348dd6c0c24c3c6b6ca10b2
-
SSDEEP
1536:ED1ORazibVXlXSGP1rrkoa32DUYSiLm78c8sDW7:EIRazibFlLJJa3IU7X8sO
Malware Config
Extracted
guloader
https://drive.google.com/uc?export=download&id=1I3kGkb4dlCcHK_IIOe0BXh1FArEjcRKc
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1356 9f6a013645a7cc8b62bd69913aa3e4b0337157631b0c83ee49346f3fbb1f0a04.exe