Analysis
-
max time kernel
94s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 21:10
Static task
static1
Behavioral task
behavioral1
Sample
document.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
document.exe
Resource
win10v2004-20240802-en
General
-
Target
document.exe
-
Size
88KB
-
MD5
3a29ec5e78273a5d9497afe943102c89
-
SHA1
b14457eed801b28dde491f6c8879def4df63ec42
-
SHA256
230d41b01617fcee8d5a438a5df4bc75910be2aa65e173ce11f7b1ed51c591a1
-
SHA512
10de5acf84a34818c35f267982b6acd131790568b37991cd8993b449d5d7a2c6403626b5c2cea58942a33a7bf1691c8850a625022408abd88ca4e034f626835f
-
SSDEEP
1536:L0pjfh9/kfVbJyrFDDmr7UcFETuEZsZyVoNrFDDmr7UclVbifh9/k:wXiVSFDD8nmTuEZsYEFDD8nlV+X
Malware Config
Extracted
guloader
https://drive.google.com/uc?export=download&id=1_C89SIhHOlv9l9ZnU366hDceUJ5YArTR
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Guloader payload 2 IoCs
resource yara_rule behavioral2/memory/4748-2-0x00000000021F0000-0x00000000021F8000-memory.dmp family_guloader behavioral2/memory/3120-4-0x00000000013A0000-0x00000000014A0000-memory.dmp family_guloader -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 14 drive.google.com 15 drive.google.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4748 document.exe 3120 RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4748 set thread context of 3120 4748 document.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language document.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4748 document.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4748 document.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4748 wrote to memory of 3120 4748 document.exe 82 PID 4748 wrote to memory of 3120 4748 document.exe 82 PID 4748 wrote to memory of 3120 4748 document.exe 82 PID 4748 wrote to memory of 3120 4748 document.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\document.exe"C:\Users\Admin\AppData\Local\Temp\document.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\document.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3120
-