Overview
overview
10Static
static
3Doc4736478...22.exe
windows7-x64
7Doc4736478...22.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Tandan7/vm...ts.dll
windows7-x64
1Tandan7/vm...ts.dll
windows10-2004-x64
1hyperbarba...-1.dll
windows7-x64
1hyperbarba...-1.dll
windows10-2004-x64
1Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 16:15
Static task
static1
Behavioral task
behavioral1
Sample
Doc4736478384775837642_JULY 2022.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Doc4736478384775837642_JULY 2022.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Tandan7/vm3ddevapi64-stats.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Tandan7/vm3ddevapi64-stats.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
hyperbarbarous/libbz2-1.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
hyperbarbarous/libbz2-1.dll
Resource
win10v2004-20241007-en
General
-
Target
Doc4736478384775837642_JULY 2022.exe
-
Size
620KB
-
MD5
e2b4171a7b83f61ae32d10fba0d7316b
-
SHA1
15ddef6a5b7b4417693d91003f4a2d03d826d71b
-
SHA256
73c90df4f49a9c5cc0b0e848dd4052b26335959618df392912982fd1ea15147b
-
SHA512
af096b104a33863acd449a84d1538e4f943d2a14e5c72b01c441019a52691c0ca7bafdec077ebb5290017f4306e1520885270297c0867cbbbea910ce047ab672
-
SSDEEP
12288:5bZpw46GMbBMMtJdW/GqEUUt4ysV8ic6SnuyCLIu:5bZpz6GMxdWK8V8icluH
Malware Config
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Loads dropped DLL 1 IoCs
pid Process 4264 Doc4736478384775837642_JULY 2022.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Fonts\TRULLISATIOS\Unvitreously.lnk Doc4736478384775837642_JULY 2022.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Doc4736478384775837642_JULY 2022.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88