Analysis

  • max time kernel
    44s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    20/02/2025, 01:09

General

  • Target

    TOTALMARINE_STATEMENTpdf.exe

  • Size

    596KB

  • MD5

    f8523b659770222998860841054c1c77

  • SHA1

    54de904ca308913f4339723d8c556b5d2b0aa1e1

  • SHA256

    dd7eb41e06820001a84bc4ec0eedcd915025b8e137cf0867731ca228b8b3c6f1

  • SHA512

    91f0eac3c4b3037f961c8aba9597085c3f05bdc8fa250fce2833a03281b2d651962c8c7615fab32c124b8e68bb4c73c9cab1ff49f5925116c7a5393d2cc90505

  • SSDEEP

    12288:5UVC9GIaG5ez1UKw0DzPXBNMhmn8az8wvnSDKwaF9AUiDeDx3E:KVzK5ez1Y0vXBWm8aYwvnCKwaqDeDB

Malware Config

Signatures

  • Guloader family
  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Loads dropped DLL 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TOTALMARINE_STATEMENTpdf.exe
    "C:\Users\Admin\AppData\Local\Temp\TOTALMARINE_STATEMENTpdf.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Users\Admin\AppData\Local\Temp\TOTALMARINE_STATEMENTpdf.exe
      "C:\Users\Admin\AppData\Local\Temp\TOTALMARINE_STATEMENTpdf.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2732
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 104
        3⤵
        • Program crash
        PID:2788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsjFC4A.tmp\System.dll

    Filesize

    11KB

    MD5

    2ae993a2ffec0c137eb51c8832691bcb

    SHA1

    98e0b37b7c14890f8a599f35678af5e9435906e1

    SHA256

    681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59

    SHA512

    2501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9

  • memory/2296-21-0x0000000077310000-0x00000000774B9000-memory.dmp

    Filesize

    1.7MB

  • memory/2296-20-0x0000000077311000-0x0000000077412000-memory.dmp

    Filesize

    1.0MB

  • memory/2732-23-0x0000000000400000-0x0000000001462000-memory.dmp

    Filesize

    16.4MB

  • memory/2732-22-0x0000000001470000-0x0000000004F89000-memory.dmp

    Filesize

    59.1MB

  • memory/2732-25-0x0000000000400000-0x0000000001462000-memory.dmp

    Filesize

    16.4MB