Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21/02/2025, 13:25
Static task
static1
Behavioral task
behavioral1
Sample
Sekundviserens.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Sekundviserens.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250217-en
General
-
Target
Sekundviserens.exe
-
Size
1.1MB
-
MD5
1db36662aaa8e2c20378a0da8fc4fed7
-
SHA1
02d3a8f945f251b427171c896090c463ecf8a4f1
-
SHA256
4ce6092bd6813374d5594601c3ab2f4c9c6c53a26ff3f090964ad20eb5ef063c
-
SHA512
602f22c7af0081fc99c1deec50c2df66af8230ec364432b17164d3389f48e9f15d711425514e5c524948ae9fb5fee53e072a5deec402bf51b354939d969301e1
-
SSDEEP
24576:8msJxuULEHaYfeJY0CFsjq5c3SddFDykNTwdQG9ikW:QGl5kSdzDPwZi7
Malware Config
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Loads dropped DLL 1 IoCs
pid Process 2844 Sekundviserens.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 drive.google.com 5 drive.google.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2844 Sekundviserens.exe 2036 Sekundviserens.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\etageboligomraader\Afbagte.ini Sekundviserens.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2768 2036 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sekundviserens.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sekundviserens.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2844 Sekundviserens.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2036 2844 Sekundviserens.exe 30 PID 2844 wrote to memory of 2036 2844 Sekundviserens.exe 30 PID 2844 wrote to memory of 2036 2844 Sekundviserens.exe 30 PID 2844 wrote to memory of 2036 2844 Sekundviserens.exe 30 PID 2844 wrote to memory of 2036 2844 Sekundviserens.exe 30 PID 2036 wrote to memory of 2768 2036 Sekundviserens.exe 33 PID 2036 wrote to memory of 2768 2036 Sekundviserens.exe 33 PID 2036 wrote to memory of 2768 2036 Sekundviserens.exe 33 PID 2036 wrote to memory of 2768 2036 Sekundviserens.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\Sekundviserens.exe"C:\Users\Admin\AppData\Local\Temp\Sekundviserens.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\Sekundviserens.exe"C:\Users\Admin\AppData\Local\Temp\Sekundviserens.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 4803⤵
- Program crash
PID:2768
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5ee260c45e97b62a5e42f17460d406068
SHA1df35f6300a03c4d3d3bd69752574426296b78695
SHA256e94a1f7bcd7e0d532b660d0af468eb3321536c3efdca265e61f9ec174b1aef27
SHA512a98f350d17c9057f33e5847462a87d59cbf2aaeda7f6299b0d49bb455e484ce4660c12d2eb8c4a0d21df523e729222bbd6c820bf25b081bc7478152515b414b3