Analysis

  • max time kernel
    143s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/08/2023, 06:01

General

  • Target

    00be8a013b9d7460a7da42c43856c5c8f7f7a7a57f4e0965c2d4c6ff6f8cc187.exe

  • Size

    4.7MB

  • MD5

    6367ce1c21594e845203ad3a68a46abc

  • SHA1

    3eb536ec14d13307cefa355c372f37275ed1fed9

  • SHA256

    00be8a013b9d7460a7da42c43856c5c8f7f7a7a57f4e0965c2d4c6ff6f8cc187

  • SHA512

    c2bd2e8f97a23ae8c056ba977fd2a154c132b6c6dfc2334b3a8f7c18ccbb95befc52f2a8f2aaff8badcbe5540b8ccc813abaa50c3e58c582d439891142ac3a85

  • SSDEEP

    6144:YDWNbS1YINJNJEaJIJEJpJZJjJyJjJEJMJjJEJjJjJEJtJ9JjJEJtJuJjJEJtJkR:YDgbS2l

Score
10/10

Malware Config

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00be8a013b9d7460a7da42c43856c5c8f7f7a7a57f4e0965c2d4c6ff6f8cc187.exe
    "C:\Users\Admin\AppData\Local\Temp\00be8a013b9d7460a7da42c43856c5c8f7f7a7a57f4e0965c2d4c6ff6f8cc187.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3836

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3836-135-0x0000000002690000-0x00000000026A1000-memory.dmp

          Filesize

          68KB

        • memory/3836-136-0x0000000002690000-0x00000000026A1000-memory.dmp

          Filesize

          68KB