Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 05:40
Static task
static1
Behavioral task
behavioral1
Sample
53342231_Invoice_Confirmation.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
53342231_Invoice_Confirmation.exe
Resource
win10v2004-20241007-en
General
-
Target
53342231_Invoice_Confirmation.exe
-
Size
92KB
-
MD5
98fcd71859d16db1109f6920d544189c
-
SHA1
1e05b211c65610102ab3bd89d6a5e69adbd69315
-
SHA256
c8d153c8dc54740bef6471505416d1ea55266106065f342921fd10946f1632d1
-
SHA512
e5be7b06e13d69fa6330821a45a631dc9504114364f4277a2538c269497cc4c382371b194411bede980bd9abb82ff6720915e1ff93c6d9355c92b6f57a3369ba
-
SSDEEP
768:DGvCXMCdIsUxnQKTlufCQ5l0UFpGRnBM5uTK6wWmT9T5PyVNz0:DDXMCCnQWlpyl0UFURK5uO685aVG
Malware Config
Extracted
guloader
https://www.uchemaduforandpartners.com/asset/janomo_ZDqaSv216.bin
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Guloader payload 1 IoCs
resource yara_rule behavioral1/memory/2816-2-0x0000000000290000-0x000000000029C000-memory.dmp family_guloader -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53342231_Invoice_Confirmation.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2816 53342231_Invoice_Confirmation.exe