Analysis
-
max time kernel
136s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
29-07-2024 11:44
Static task
static1
Behavioral task
behavioral1
Sample
CEMENTOS-DOC.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
CEMENTOS-DOC.exe
Resource
win10v2004-20240709-en
General
-
Target
CEMENTOS-DOC.exe
-
Size
60KB
-
MD5
b7974ace4e5436770ce9b63a315fab68
-
SHA1
43aed757f4864e1fab98d88faf690d84435d036e
-
SHA256
994655b2cfd0979f7b96ae1f4423510633a82adf92fa6486dfd2f3243e96618d
-
SHA512
287938f69f46de39ceeb2bc078dbc6b6e0850f0ad0df676717bd0dba31ae1be4492dbf584c3c816ef7368a1eb01b5ddcbabee7341efc8cfb66fd1503008927cd
-
SSDEEP
768:CZZ3hCu+e5MxzVZpXEewlIAc9BRYxLznw72c:0rCupIZZFrWIbW/c
Malware Config
Extracted
guloader
https://drive.google.com/uc?export=download&id=1LmyqIluFJ5HoNT0VjWSvtPFmVfK-cvxy
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Checks QEMU agent file 2 TTPs 1 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
description ioc Process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe CEMENTOS-DOC.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 5020 CEMENTOS-DOC.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CEMENTOS-DOC.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5020 CEMENTOS-DOC.exe