Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03-11-2024 19:58
Static task
static1
Behavioral task
behavioral1
Sample
Letter of Intent (LOI) For the Company November 2024 PDF.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Letter of Intent (LOI) For the Company November 2024 PDF.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
General
-
Target
Letter of Intent (LOI) For the Company November 2024 PDF.exe
-
Size
851KB
-
MD5
629be165860d2336755de85467756639
-
SHA1
af1da57d01a00bf942e127cce60fb4208bfd9795
-
SHA256
e9617a78c93e6d5cdc1087dfa6e9bf9d63406e05b6b01135c189242a7c33718c
-
SHA512
418f56a804212158033b1ae592cafeb8fa1c5a0d9506eb541beb7762c23ebfe5c61dbac8588c350816c229e9f6d77457e361423146874695976c1b8d9267cbff
-
SSDEEP
24576:ZNAsPMh+Cdd8509puHmATonQ1htKzWbGWO:dPMvA509pkonAhtHbnO
Malware Config
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Loads dropped DLL 2 IoCs
Processes:
Letter of Intent (LOI) For the Company November 2024 PDF.exepid process 2768 Letter of Intent (LOI) For the Company November 2024 PDF.exe 2768 Letter of Intent (LOI) For the Company November 2024 PDF.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
Letter of Intent (LOI) For the Company November 2024 PDF.exeLetter of Intent (LOI) For the Company November 2024 PDF.exepid process 2768 Letter of Intent (LOI) For the Company November 2024 PDF.exe 2672 Letter of Intent (LOI) For the Company November 2024 PDF.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Letter of Intent (LOI) For the Company November 2024 PDF.exedescription pid process target process PID 2768 set thread context of 2672 2768 Letter of Intent (LOI) For the Company November 2024 PDF.exe Letter of Intent (LOI) For the Company November 2024 PDF.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Letter of Intent (LOI) For the Company November 2024 PDF.exeLetter of Intent (LOI) For the Company November 2024 PDF.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Letter of Intent (LOI) For the Company November 2024 PDF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Letter of Intent (LOI) For the Company November 2024 PDF.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
Letter of Intent (LOI) For the Company November 2024 PDF.exepid process 2768 Letter of Intent (LOI) For the Company November 2024 PDF.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
Letter of Intent (LOI) For the Company November 2024 PDF.exedescription pid process target process PID 2768 wrote to memory of 2672 2768 Letter of Intent (LOI) For the Company November 2024 PDF.exe Letter of Intent (LOI) For the Company November 2024 PDF.exe PID 2768 wrote to memory of 2672 2768 Letter of Intent (LOI) For the Company November 2024 PDF.exe Letter of Intent (LOI) For the Company November 2024 PDF.exe PID 2768 wrote to memory of 2672 2768 Letter of Intent (LOI) For the Company November 2024 PDF.exe Letter of Intent (LOI) For the Company November 2024 PDF.exe PID 2768 wrote to memory of 2672 2768 Letter of Intent (LOI) For the Company November 2024 PDF.exe Letter of Intent (LOI) For the Company November 2024 PDF.exe PID 2768 wrote to memory of 2672 2768 Letter of Intent (LOI) For the Company November 2024 PDF.exe Letter of Intent (LOI) For the Company November 2024 PDF.exe PID 2768 wrote to memory of 2672 2768 Letter of Intent (LOI) For the Company November 2024 PDF.exe Letter of Intent (LOI) For the Company November 2024 PDF.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Letter of Intent (LOI) For the Company November 2024 PDF.exe"C:\Users\Admin\AppData\Local\Temp\Letter of Intent (LOI) For the Company November 2024 PDF.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\Letter of Intent (LOI) For the Company November 2024 PDF.exe"C:\Users\Admin\AppData\Local\Temp\Letter of Intent (LOI) For the Company November 2024 PDF.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45B
MD58b9fc0443d7e48145e2d4b37afb2d37b
SHA164a5718a478a38ac262d2e46da81d0e88c122a0f
SHA2564f743978ead44260f895c983689d718e31ca826161c447d205021a9d3e010afa
SHA5125126da1d29f662465241c8b51b95783df3f88c8feb8bb1b65dcf354738c48aab4bfb6c0035dfe6b40fa03ae5aaba8f72f1c31343aec7d4edb9c6ebcc773cc3d3
-
Filesize
11KB
MD5be2621a78a13a56cf09e00dd98488360
SHA175f0539dc6af200a07cdb056cddddec595c6cfd2
SHA256852047023ba0cae91c7a43365878613cfb4e64e36ff98c460e113d5088d68ef5
SHA512b80cf1f678e6885276b9a1bfd9227374b2eb9e38bb20446d52ebe2c3dba89764aa50cb4d49df51a974478f3364b5dbcbc5b4a16dc8f1123b40c89c01725be3d1