Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2024 15:44

General

  • Target

    5dd0b3b36f6e543617bd5d1c7f45ec56406ab95d585cbcfea73a7a0877f8c890.exe

  • Size

    307KB

  • MD5

    63532a519bd02c6aae21d1af04c8d91f

  • SHA1

    9f4593a6241658698f6aa84fe2f590ccecc21f28

  • SHA256

    5dd0b3b36f6e543617bd5d1c7f45ec56406ab95d585cbcfea73a7a0877f8c890

  • SHA512

    7d0dfc91e9d7f3747bbf137b1f0155a0068bbb39db4e8129f780a5e49cb9c23d3aad92c961609513c410f12207fbef41ec8dc0bf26fe2f4c9af6a93e5cf33e1b

  • SSDEEP

    6144:E1ssjH3zJkAD54sRVruVPYQcBHy5aFKJz5thM7O8LY1gPfxVJMyF:5sjD19FCmLlKFvhM7bf/

Malware Config

Signatures

  • Guloader family
  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Checks QEMU agent file 2 TTPs 2 IoCs

    Checks presence of QEMU agent, possibly to detect virtualization.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5dd0b3b36f6e543617bd5d1c7f45ec56406ab95d585cbcfea73a7a0877f8c890.exe
    "C:\Users\Admin\AppData\Local\Temp\5dd0b3b36f6e543617bd5d1c7f45ec56406ab95d585cbcfea73a7a0877f8c890.exe"
    1⤵
    • Checks QEMU agent file
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:3904
    • C:\Users\Admin\AppData\Local\Temp\5dd0b3b36f6e543617bd5d1c7f45ec56406ab95d585cbcfea73a7a0877f8c890.exe
      "C:\Users\Admin\AppData\Local\Temp\5dd0b3b36f6e543617bd5d1c7f45ec56406ab95d585cbcfea73a7a0877f8c890.exe"
      2⤵
      • Checks QEMU agent file
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      PID:4688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsqE188.tmp\System.dll

    Filesize

    12KB

    MD5

    792b6f86e296d3904285b2bf67ccd7e0

    SHA1

    966b16f84697552747e0ddd19a4ba8ab5083af31

    SHA256

    c7a20bcaa0197aedddc8e4797bbb33fdf70d980f5e83c203d148121c2106d917

    SHA512

    97edc3410b88ca31abc0af0324258d2b59127047810947d0fb5e7e12957db34d206ffd70a0456add3a26b0546643ff0234124b08423c2c9ffe9bdec6eb210f2c

  • memory/3904-10-0x0000000002A40000-0x0000000002B60000-memory.dmp

    Filesize

    1.1MB

  • memory/3904-11-0x0000000002A40000-0x0000000002B60000-memory.dmp

    Filesize

    1.1MB

  • memory/3904-12-0x0000000076F51000-0x0000000077071000-memory.dmp

    Filesize

    1.1MB

  • memory/3904-13-0x0000000073DB5000-0x0000000073DB6000-memory.dmp

    Filesize

    4KB

  • memory/3904-26-0x0000000002A40000-0x0000000002B60000-memory.dmp

    Filesize

    1.1MB

  • memory/4688-15-0x0000000001660000-0x0000000001760000-memory.dmp

    Filesize

    1024KB

  • memory/4688-16-0x0000000076F51000-0x0000000077071000-memory.dmp

    Filesize

    1.1MB

  • memory/4688-17-0x0000000001660000-0x0000000001760000-memory.dmp

    Filesize

    1024KB

  • memory/4688-18-0x0000000076FD8000-0x0000000076FD9000-memory.dmp

    Filesize

    4KB

  • memory/4688-19-0x0000000000400000-0x0000000001654000-memory.dmp

    Filesize

    18.3MB

  • memory/4688-20-0x0000000076F51000-0x0000000077071000-memory.dmp

    Filesize

    1.1MB

  • memory/4688-14-0x0000000000400000-0x0000000001654000-memory.dmp

    Filesize

    18.3MB