Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2025 05:42

General

  • Target

    e5fd95536576d21b43b1552aed3040ea366375b5a952c333dd89f1ed251c12aa.exe

  • Size

    571KB

  • MD5

    9bb2cdb8508ee2255a35ecec43462a48

  • SHA1

    c7465e8b0a3ae61b23520752afbb8bf89a3cecdd

  • SHA256

    e5fd95536576d21b43b1552aed3040ea366375b5a952c333dd89f1ed251c12aa

  • SHA512

    0b8e8399eb04372c1cb70467dca25078ab255d01c448fa7ccabd620d9066306a1127c4e5caa4af66226662bb3b2d143045b9212332e7408c7b97ea40672a0ac1

  • SSDEEP

    12288:ifYfUlNHYh6EEfqUhn5i5mfQAsS+6ePZxIgLF7eEbH+aj:ifYMPYcqUhY5mp9+6ehxIg5H9j

Malware Config

Signatures

  • Guloader family
  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Loads dropped DLL 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e5fd95536576d21b43b1552aed3040ea366375b5a952c333dd89f1ed251c12aa.exe
    "C:\Users\Admin\AppData\Local\Temp\e5fd95536576d21b43b1552aed3040ea366375b5a952c333dd89f1ed251c12aa.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:4956
    • C:\Users\Admin\AppData\Local\Temp\e5fd95536576d21b43b1552aed3040ea366375b5a952c333dd89f1ed251c12aa.exe
      "C:\Users\Admin\AppData\Local\Temp\e5fd95536576d21b43b1552aed3040ea366375b5a952c333dd89f1ed251c12aa.exe"
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      PID:3472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsc8B59.tmp\System.dll

    Filesize

    12KB

    MD5

    192639861e3dc2dc5c08bb8f8c7260d5

    SHA1

    58d30e460609e22fa0098bc27d928b689ef9af78

    SHA256

    23d618a0293c78ce00f7c6e6dd8b8923621da7dd1f63a070163ef4c0ec3033d6

    SHA512

    6e573d8b2ef6ed719e271fd0b2fd9cd451f61fc9a9459330108d6d7a65a0f64016303318cad787aa1d5334ba670d8f1c7c13074e1be550b4a316963ecc465cdc

  • memory/3472-15-0x0000000001700000-0x0000000003817000-memory.dmp

    Filesize

    33.1MB

  • memory/3472-28-0x00000000004A0000-0x00000000016F4000-memory.dmp

    Filesize

    18.3MB

  • memory/3472-29-0x0000000001700000-0x0000000003817000-memory.dmp

    Filesize

    33.1MB

  • memory/4956-11-0x0000000004270000-0x0000000006387000-memory.dmp

    Filesize

    33.1MB

  • memory/4956-12-0x0000000077311000-0x0000000077431000-memory.dmp

    Filesize

    1.1MB

  • memory/4956-13-0x0000000073F65000-0x0000000073F66000-memory.dmp

    Filesize

    4KB

  • memory/4956-14-0x0000000004270000-0x0000000006387000-memory.dmp

    Filesize

    33.1MB