Overview
overview
10Static
static
10#Order#.exe
windows7-x64
10#Order#.exe
windows10-2004-x64
10#QTN-20-97...7..exe
windows7-x64
10#QTN-20-97...7..exe
windows10-2004-x64
10$70k MT 30JAN.exe
windows7-x64
10$70k MT 30JAN.exe
windows10-2004-x64
1003-02-20.exe
windows7-x64
1003-02-20.exe
windows10-2004-x64
1020191107145436608.exe
windows7-x64
1020191107145436608.exe
windows10-2004-x64
102019111211...fo.exe
windows7-x64
102019111211...fo.exe
windows10-2004-x64
102020 ORDERS.exe
windows7-x64
102020 ORDERS.exe
windows10-2004-x64
10624880_ZOC...PT.exe
windows7-x64
10624880_ZOC...PT.exe
windows10-2004-x64
10ADMIN DEPT...NT.exe
windows7-x64
10ADMIN DEPT...NT.exe
windows10-2004-x64
10AWB_TR0089.exe
windows7-x64
3AWB_TR0089.exe
windows10-2004-x64
3Avis de virement.exe
windows7-x64
10Avis de virement.exe
windows10-2004-x64
10BL-INVOICE...CS.exe
windows7-x64
10BL-INVOICE...CS.exe
windows10-2004-x64
10BMS PO 4820.exe
windows7-x64
10BMS PO 4820.exe
windows10-2004-x64
10BSO_191120...df.exe
windows7-x64
10BSO_191120...df.exe
windows10-2004-x64
10Bank Information.exe
windows7-x64
10Bank Information.exe
windows10-2004-x64
10C.V - Expe...es.exe
windows7-x64
3C.V - Expe...es.exe
windows10-2004-x64
3Analysis
-
max time kernel
92s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 14:12
Behavioral task
behavioral1
Sample
#Order#.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
#Order#.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
#QTN-20-971-JA04Q7..exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
#QTN-20-971-JA04Q7..exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$70k MT 30JAN.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$70k MT 30JAN.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
03-02-20.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
03-02-20.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
20191107145436608.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
20191107145436608.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
2019111211292579875_BankInfo.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
2019111211292579875_BankInfo.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
2020 ORDERS.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
2020 ORDERS.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
624880_ZOC10280374040_IFP_PT.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
624880_ZOC10280374040_IFP_PT.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
ADMIN DEPT. INVOICES 482 SGT STATEMENT.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
ADMIN DEPT. INVOICES 482 SGT STATEMENT.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
AWB_TR0089.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
AWB_TR0089.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Avis de virement.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
Avis de virement.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
BL-INVOICE SHIPPING DOCS.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
BL-INVOICE SHIPPING DOCS.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
BMS PO 4820.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
BMS PO 4820.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
BSO_191120201_430001882_SHpdf.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
BSO_191120201_430001882_SHpdf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Bank Information.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Bank Information.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
C.V - Experience Certificates.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
C.V - Experience Certificates.exe
Resource
win10v2004-20241007-en
General
-
Target
Bank Information.exe
-
Size
60KB
-
MD5
8f30fe69d5146ed6130120da495a87f2
-
SHA1
042be30d423150c335bad3556bb4d290b24c97cc
-
SHA256
dd23cc62b3dcf7ae6a4063b8a64d925f3b796692c624dde7f9b1b3ee5692c7f5
-
SHA512
48272c92bfee25c7a8db5b89eaccbbf6d78fce6b05362f05beb1e90ce47fd0435746234d9eb0cb87126c978b3d3a44091f2398afdcbce916239f53d27a52525f
-
SSDEEP
768:VkDKf+cjuzt1CfCmaW5qXgmT/JdfFBKy7psh:Vk2F5amaW51a/DR7Kh
Malware Config
Extracted
guloader
https://drive.google.com/uc?export=download&id=1XjUHIgW5T6HcodhQNf4poqrFbSYVe2Qd
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Guloader payload 2 IoCs
resource yara_rule behavioral30/memory/5116-2-0x0000000000540000-0x0000000000547000-memory.dmp family_guloader behavioral30/memory/384-4-0x0000000000D60000-0x0000000000E60000-memory.dmp family_guloader -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 drive.google.com 8 drive.google.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 5116 Bank Information.exe 384 RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5116 set thread context of 384 5116 Bank Information.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bank Information.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 5116 Bank Information.exe 5116 Bank Information.exe 5116 Bank Information.exe 5116 Bank Information.exe 5116 Bank Information.exe 5116 Bank Information.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5116 Bank Information.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 5116 wrote to memory of 3936 5116 Bank Information.exe 82 PID 5116 wrote to memory of 3936 5116 Bank Information.exe 82 PID 5116 wrote to memory of 3936 5116 Bank Information.exe 82 PID 5116 wrote to memory of 2556 5116 Bank Information.exe 83 PID 5116 wrote to memory of 2556 5116 Bank Information.exe 83 PID 5116 wrote to memory of 2556 5116 Bank Information.exe 83 PID 5116 wrote to memory of 696 5116 Bank Information.exe 84 PID 5116 wrote to memory of 696 5116 Bank Information.exe 84 PID 5116 wrote to memory of 696 5116 Bank Information.exe 84 PID 5116 wrote to memory of 872 5116 Bank Information.exe 85 PID 5116 wrote to memory of 872 5116 Bank Information.exe 85 PID 5116 wrote to memory of 872 5116 Bank Information.exe 85 PID 5116 wrote to memory of 4600 5116 Bank Information.exe 86 PID 5116 wrote to memory of 4600 5116 Bank Information.exe 86 PID 5116 wrote to memory of 4600 5116 Bank Information.exe 86 PID 5116 wrote to memory of 384 5116 Bank Information.exe 87 PID 5116 wrote to memory of 384 5116 Bank Information.exe 87 PID 5116 wrote to memory of 384 5116 Bank Information.exe 87 PID 5116 wrote to memory of 384 5116 Bank Information.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bank Information.exe"C:\Users\Admin\AppData\Local\Temp\Bank Information.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\Bank Information.exe"2⤵PID:3936
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\Bank Information.exe"2⤵PID:2556
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\Bank Information.exe"2⤵PID:696
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\Bank Information.exe"2⤵PID:872
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\Bank Information.exe"2⤵PID:4600
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\Bank Information.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:384
-