Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:51
Static task
static1
Behavioral task
behavioral1
Sample
7523103a55465d71b5686bf960694027.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7523103a55465d71b5686bf960694027.exe
Resource
win10v2004-20231215-en
General
-
Target
7523103a55465d71b5686bf960694027.exe
-
Size
152KB
-
MD5
7523103a55465d71b5686bf960694027
-
SHA1
e69d656bb003eaf6f3966e9bb89f9e14b191c960
-
SHA256
dc818bb2797249f1cc13daf873c34127b1b3c8a6bf1ceb1fc7392613114c5269
-
SHA512
17ecf4626a44a89ac8622d9755da3f64e679f9008283c2f95b7f3a4431023d1ee2f412c4f1fdd82e709d37ad5a4a98889e17352875da0813f84884742daa507c
-
SSDEEP
1536:JhUoHf+unUoBn+RF95VmHFJ4c+2/S5B/8qxqlKVt1g+9u:TN2M8nclJ4cJGpBqlAguu
Malware Config
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Checks QEMU agent file 2 TTPs 2 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
description ioc Process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe 7523103a55465d71b5686bf960694027.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe 7523103a55465d71b5686bf960694027.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 20 drive.google.com 21 drive.google.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 636 7523103a55465d71b5686bf960694027.exe 2356 7523103a55465d71b5686bf960694027.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 636 set thread context of 2356 636 7523103a55465d71b5686bf960694027.exe 95 -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 636 7523103a55465d71b5686bf960694027.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 636 7523103a55465d71b5686bf960694027.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 636 wrote to memory of 2356 636 7523103a55465d71b5686bf960694027.exe 95 PID 636 wrote to memory of 2356 636 7523103a55465d71b5686bf960694027.exe 95 PID 636 wrote to memory of 2356 636 7523103a55465d71b5686bf960694027.exe 95 PID 636 wrote to memory of 2356 636 7523103a55465d71b5686bf960694027.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\7523103a55465d71b5686bf960694027.exe"C:\Users\Admin\AppData\Local\Temp\7523103a55465d71b5686bf960694027.exe"1⤵
- Checks QEMU agent file
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Local\Temp\7523103a55465d71b5686bf960694027.exe"C:\Users\Admin\AppData\Local\Temp\7523103a55465d71b5686bf960694027.exe"2⤵
- Checks QEMU agent file
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2356
-