Analysis
-
max time kernel
134s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 14:52
Static task
static1
Behavioral task
behavioral1
Sample
4126a4ad4a20756043a562502f447197.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4126a4ad4a20756043a562502f447197.exe
Resource
win10v2004-20231222-en
General
-
Target
4126a4ad4a20756043a562502f447197.exe
-
Size
4.8MB
-
MD5
4126a4ad4a20756043a562502f447197
-
SHA1
df0ab91825a8d00842209acc3929bc9010d892da
-
SHA256
383718eeccce24cc6f40e40d479ec205a52a36f3d62c2ed5cec423ae41e9f354
-
SHA512
cd28a5a6a47e9d8362089441a9fda205709c130e1fe2b4fcdbf13b3e4bff4a74ea58a183f95c98bff741b1c4d54b55078385344b0ebb1682b6fa911dd59dac60
-
SSDEEP
12288:tkEDf3HbHCAtiEHmQTHv/2wTnmYbZZH+HHQz7CerHniGf7iknbCA:tkELLVtinQL/2HkZQwTLniGj
Malware Config
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Checks QEMU agent file 2 TTPs 1 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
description ioc Process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe 4126a4ad4a20756043a562502f447197.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2172 4126a4ad4a20756043a562502f447197.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2172 4126a4ad4a20756043a562502f447197.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4126a4ad4a20756043a562502f447197.exe"C:\Users\Admin\AppData\Local\Temp\4126a4ad4a20756043a562502f447197.exe"1⤵
- Checks QEMU agent file
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2172 -
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Users\Admin\AppData\Local\Temp\4126a4ad4a20756043a562502f447197.exe"2⤵PID:1932
-