Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2024, 18:54

General

  • Target

    PROFORMA INV BTI39405059_PDF.exe

  • Size

    120KB

  • MD5

    9bff0125ee75813a016a50d69bf733da

  • SHA1

    2926e83c26a210dab8272405b3fd6938e52afbe7

  • SHA256

    b5f925f4de1012dc51fc822718fdee1816e651ec178b88327b3feb1068db13c9

  • SHA512

    ede9a23437a256be28054bb37e77cc92a152262dd40194645a9ef52a3ffc74cc7005de013be78af9d6ccaa60cf0519f389507226ba96e8fe8c353b59f979dc87

  • SSDEEP

    1536:TDkmB3sAiK0kF1JyQmvoTgdJNBbDkeLsKVfHFfwUO4ekqGnD7HECGk/pDk:TYWeKN7crumD6KVfa4e1GnDD//pY

Malware Config

Signatures

  • Guloader family
  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Checks QEMU agent file 2 TTPs 2 IoCs

    Checks presence of QEMU agent, possibly to detect virtualization.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PROFORMA INV BTI39405059_PDF.exe
    "C:\Users\Admin\AppData\Local\Temp\PROFORMA INV BTI39405059_PDF.exe"
    1⤵
    • Checks QEMU agent file
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2840
    • C:\Users\Admin\AppData\Local\Temp\PROFORMA INV BTI39405059_PDF.exe
      "C:\Users\Admin\AppData\Local\Temp\PROFORMA INV BTI39405059_PDF.exe"
      2⤵
      • Checks QEMU agent file
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      PID:4300

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2840-2-0x00000000022D0000-0x00000000022E7000-memory.dmp

          Filesize

          92KB

        • memory/2840-3-0x0000000077821000-0x0000000077941000-memory.dmp

          Filesize

          1.1MB

        • memory/2840-4-0x00000000022D0000-0x00000000022E7000-memory.dmp

          Filesize

          92KB

        • memory/2840-5-0x0000000077821000-0x0000000077941000-memory.dmp

          Filesize

          1.1MB

        • memory/2840-8-0x00000000022D0000-0x00000000022E7000-memory.dmp

          Filesize

          92KB

        • memory/4300-6-0x0000000000400000-0x000000000055D000-memory.dmp

          Filesize

          1.4MB

        • memory/4300-9-0x0000000000560000-0x0000000000660000-memory.dmp

          Filesize

          1024KB

        • memory/4300-10-0x0000000000560000-0x0000000000660000-memory.dmp

          Filesize

          1024KB

        • memory/4300-11-0x0000000000400000-0x000000000055D000-memory.dmp

          Filesize

          1.4MB