Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 01:55
Static task
static1
Behavioral task
behavioral1
Sample
0c5f8d449109255f86eb33101a838983a8772fcbca23abeca03c4dc437710f97.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0c5f8d449109255f86eb33101a838983a8772fcbca23abeca03c4dc437710f97.exe
Resource
win10v2004-20241007-en
General
-
Target
0c5f8d449109255f86eb33101a838983a8772fcbca23abeca03c4dc437710f97.exe
-
Size
136KB
-
MD5
4794611e9a5a9a628c386a4d4d06faf7
-
SHA1
0a1eacd7c9103c488627ec4f843760aceb3f2c5a
-
SHA256
0c5f8d449109255f86eb33101a838983a8772fcbca23abeca03c4dc437710f97
-
SHA512
049303f6a13af084dae2b621e50d8b3bb196abb66c2673b46ca788aec10a7289ba15c155a8f5356800030e597be3420d7bada053ab36aaad532ec257b66fa534
-
SSDEEP
1536:m41u3raOE3N7cuwoYIMFo0aQp2ZUSby46FB8kPDm:vu7edao0aQpaUmy46FqkPK
Malware Config
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c5f8d449109255f86eb33101a838983a8772fcbca23abeca03c4dc437710f97.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2204 0c5f8d449109255f86eb33101a838983a8772fcbca23abeca03c4dc437710f97.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c5f8d449109255f86eb33101a838983a8772fcbca23abeca03c4dc437710f97.exe"C:\Users\Admin\AppData\Local\Temp\0c5f8d449109255f86eb33101a838983a8772fcbca23abeca03c4dc437710f97.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2204