Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2024 15:44

General

  • Target

    5dd0b3b36f6e543617bd5d1c7f45ec56406ab95d585cbcfea73a7a0877f8c890.exe

  • Size

    307KB

  • MD5

    63532a519bd02c6aae21d1af04c8d91f

  • SHA1

    9f4593a6241658698f6aa84fe2f590ccecc21f28

  • SHA256

    5dd0b3b36f6e543617bd5d1c7f45ec56406ab95d585cbcfea73a7a0877f8c890

  • SHA512

    7d0dfc91e9d7f3747bbf137b1f0155a0068bbb39db4e8129f780a5e49cb9c23d3aad92c961609513c410f12207fbef41ec8dc0bf26fe2f4c9af6a93e5cf33e1b

  • SSDEEP

    6144:E1ssjH3zJkAD54sRVruVPYQcBHy5aFKJz5thM7O8LY1gPfxVJMyF:5sjD19FCmLlKFvhM7bf/

Malware Config

Signatures

  • Guloader family
  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Checks QEMU agent file 2 TTPs 2 IoCs

    Checks presence of QEMU agent, possibly to detect virtualization.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5dd0b3b36f6e543617bd5d1c7f45ec56406ab95d585cbcfea73a7a0877f8c890.exe
    "C:\Users\Admin\AppData\Local\Temp\5dd0b3b36f6e543617bd5d1c7f45ec56406ab95d585cbcfea73a7a0877f8c890.exe"
    1⤵
    • Checks QEMU agent file
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Users\Admin\AppData\Local\Temp\5dd0b3b36f6e543617bd5d1c7f45ec56406ab95d585cbcfea73a7a0877f8c890.exe
      "C:\Users\Admin\AppData\Local\Temp\5dd0b3b36f6e543617bd5d1c7f45ec56406ab95d585cbcfea73a7a0877f8c890.exe"
      2⤵
      • Checks QEMU agent file
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      PID:580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsdBEAF.tmp\System.dll

    Filesize

    12KB

    MD5

    792b6f86e296d3904285b2bf67ccd7e0

    SHA1

    966b16f84697552747e0ddd19a4ba8ab5083af31

    SHA256

    c7a20bcaa0197aedddc8e4797bbb33fdf70d980f5e83c203d148121c2106d917

    SHA512

    97edc3410b88ca31abc0af0324258d2b59127047810947d0fb5e7e12957db34d206ffd70a0456add3a26b0546643ff0234124b08423c2c9ffe9bdec6eb210f2c

  • memory/580-15-0x0000000000400000-0x0000000001462000-memory.dmp

    Filesize

    16.4MB

  • memory/580-16-0x0000000076F30000-0x00000000770D9000-memory.dmp

    Filesize

    1.7MB

  • memory/580-17-0x0000000000400000-0x0000000001462000-memory.dmp

    Filesize

    16.4MB

  • memory/2412-11-0x0000000002990000-0x0000000002AB0000-memory.dmp

    Filesize

    1.1MB

  • memory/2412-12-0x0000000076F31000-0x0000000077032000-memory.dmp

    Filesize

    1.0MB

  • memory/2412-14-0x0000000076F30000-0x00000000770D9000-memory.dmp

    Filesize

    1.7MB

  • memory/2412-13-0x0000000002990000-0x0000000002AB0000-memory.dmp

    Filesize

    1.1MB

  • memory/2412-29-0x0000000002990000-0x0000000002AB0000-memory.dmp

    Filesize

    1.1MB