Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 02:41
Static task
static1
Behavioral task
behavioral1
Sample
7263a8930afb910d367c5e228694a8c291c8f797e87c082583bcb425fdc525c9.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
7263a8930afb910d367c5e228694a8c291c8f797e87c082583bcb425fdc525c9.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
General
-
Target
7263a8930afb910d367c5e228694a8c291c8f797e87c082583bcb425fdc525c9.exe
-
Size
734KB
-
MD5
0c9009a01f16ae4f68f806f30fad5ed2
-
SHA1
c92ad48134ec43427462c3657cd229dd31e239df
-
SHA256
7263a8930afb910d367c5e228694a8c291c8f797e87c082583bcb425fdc525c9
-
SHA512
d894bb452e05548a757bfbd8ddc0c3b55686690923ca01c58e68d399afe88d5d013076fcf83fcb51483e887373ad5bc76671998b3b738cd01c5752511a10db63
-
SSDEEP
12288:EI0YglGokRtZYxDuT5+tofxytZ4FbVjLfWJRuDnEFGuAY2eAuVLZEqhaH/e5rS++:EI0blXUEx4+ptZ4/WJAgHA8AuVLZEkLm
Malware Config
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Loads dropped DLL 7 IoCs
Processes:
7263a8930afb910d367c5e228694a8c291c8f797e87c082583bcb425fdc525c9.exepid Process 692 7263a8930afb910d367c5e228694a8c291c8f797e87c082583bcb425fdc525c9.exe 692 7263a8930afb910d367c5e228694a8c291c8f797e87c082583bcb425fdc525c9.exe 692 7263a8930afb910d367c5e228694a8c291c8f797e87c082583bcb425fdc525c9.exe 692 7263a8930afb910d367c5e228694a8c291c8f797e87c082583bcb425fdc525c9.exe 692 7263a8930afb910d367c5e228694a8c291c8f797e87c082583bcb425fdc525c9.exe 692 7263a8930afb910d367c5e228694a8c291c8f797e87c082583bcb425fdc525c9.exe 692 7263a8930afb910d367c5e228694a8c291c8f797e87c082583bcb425fdc525c9.exe -
Drops file in System32 directory 1 IoCs
Processes:
7263a8930afb910d367c5e228694a8c291c8f797e87c082583bcb425fdc525c9.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\Eritas.fat 7263a8930afb910d367c5e228694a8c291c8f797e87c082583bcb425fdc525c9.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
7263a8930afb910d367c5e228694a8c291c8f797e87c082583bcb425fdc525c9.exe7263a8930afb910d367c5e228694a8c291c8f797e87c082583bcb425fdc525c9.exepid Process 692 7263a8930afb910d367c5e228694a8c291c8f797e87c082583bcb425fdc525c9.exe 2152 7263a8930afb910d367c5e228694a8c291c8f797e87c082583bcb425fdc525c9.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
7263a8930afb910d367c5e228694a8c291c8f797e87c082583bcb425fdc525c9.exedescription pid Process procid_target PID 692 set thread context of 2152 692 7263a8930afb910d367c5e228694a8c291c8f797e87c082583bcb425fdc525c9.exe 94 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
7263a8930afb910d367c5e228694a8c291c8f797e87c082583bcb425fdc525c9.exe7263a8930afb910d367c5e228694a8c291c8f797e87c082583bcb425fdc525c9.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7263a8930afb910d367c5e228694a8c291c8f797e87c082583bcb425fdc525c9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7263a8930afb910d367c5e228694a8c291c8f797e87c082583bcb425fdc525c9.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
7263a8930afb910d367c5e228694a8c291c8f797e87c082583bcb425fdc525c9.exepid Process 692 7263a8930afb910d367c5e228694a8c291c8f797e87c082583bcb425fdc525c9.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
7263a8930afb910d367c5e228694a8c291c8f797e87c082583bcb425fdc525c9.exedescription pid Process procid_target PID 692 wrote to memory of 2152 692 7263a8930afb910d367c5e228694a8c291c8f797e87c082583bcb425fdc525c9.exe 94 PID 692 wrote to memory of 2152 692 7263a8930afb910d367c5e228694a8c291c8f797e87c082583bcb425fdc525c9.exe 94 PID 692 wrote to memory of 2152 692 7263a8930afb910d367c5e228694a8c291c8f797e87c082583bcb425fdc525c9.exe 94 PID 692 wrote to memory of 2152 692 7263a8930afb910d367c5e228694a8c291c8f797e87c082583bcb425fdc525c9.exe 94 PID 692 wrote to memory of 2152 692 7263a8930afb910d367c5e228694a8c291c8f797e87c082583bcb425fdc525c9.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\7263a8930afb910d367c5e228694a8c291c8f797e87c082583bcb425fdc525c9.exe"C:\Users\Admin\AppData\Local\Temp\7263a8930afb910d367c5e228694a8c291c8f797e87c082583bcb425fdc525c9.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Users\Admin\AppData\Local\Temp\7263a8930afb910d367c5e228694a8c291c8f797e87c082583bcb425fdc525c9.exe"C:\Users\Admin\AppData\Local\Temp\7263a8930afb910d367c5e228694a8c291c8f797e87c082583bcb425fdc525c9.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5c5351b7c9aa48e9e7872288a3e7dd583
SHA169efcf341345625a4a855f03f2a9d9e8f50319b2
SHA256982954ea90a10844bff23d595ac2449c6fae300aee2ab4c23077aac1197b7c2e
SHA5126e655e02aa05bc52beec428686622c4c1c1ffc7e5aba0f6d429495cba29bee5733b26ac7aecbeaa9e525eae52706a2513035d17cc7b0ccbcf792c765c9427d7b
-
Filesize
11KB
MD5c61501f07cf09bcfcdfe4cc8a1ebbbe3
SHA1e8581b4359651b857646ae727efaaef372daa0fc
SHA2567e75f148920db6300dad5a1c12fd5d6eecc95698a310a01311181bc98a704d55
SHA5129837abe7ec3fa0f1f5193968d12b7ca1893e34eddf628db1f7ab6715b4de339231f0ec1b5f0f86c767f5a30c40da5c4a95e99deedd22eece93cb0d00539aad24