Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23/02/2025, 02:18
Static task
static1
Behavioral task
behavioral1
Sample
Bunker (STS) Notification..exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Bunker (STS) Notification..exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250217-en
General
-
Target
Bunker (STS) Notification..exe
-
Size
619KB
-
MD5
c176fa88d211acc3d63d6c8d3cf8d5a6
-
SHA1
c87881a891fa05cd1c4caa8cc10451359db163f4
-
SHA256
6ba3a37ac78eef40080be3a47e0ebcc30619221480d5bdd60a97fd571bda2ba2
-
SHA512
4b80ec090a296025b45de505d36059258701bdc78330421a00679bac5da6e5105d4b9eb1b11bf5398fd154a62ee8d30d023b87d55acdacc2d28ea1382384a886
-
SSDEEP
12288:5UVC9GIaG5ez13NhJN6U+c7DK3YKFQC0ncfFF9AUiDeDx3E:KVzK5ez13N56UP7RKFQC0cdqDeDB
Malware Config
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Loads dropped DLL 2 IoCs
pid Process 2644 Bunker (STS) Notification..exe 2644 Bunker (STS) Notification..exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2644 Bunker (STS) Notification..exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2648 2556 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bunker (STS) Notification..exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bunker (STS) Notification..exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2644 Bunker (STS) Notification..exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2556 2644 Bunker (STS) Notification..exe 30 PID 2644 wrote to memory of 2556 2644 Bunker (STS) Notification..exe 30 PID 2644 wrote to memory of 2556 2644 Bunker (STS) Notification..exe 30 PID 2644 wrote to memory of 2556 2644 Bunker (STS) Notification..exe 30 PID 2644 wrote to memory of 2556 2644 Bunker (STS) Notification..exe 30 PID 2556 wrote to memory of 2648 2556 Bunker (STS) Notification..exe 31 PID 2556 wrote to memory of 2648 2556 Bunker (STS) Notification..exe 31 PID 2556 wrote to memory of 2648 2556 Bunker (STS) Notification..exe 31 PID 2556 wrote to memory of 2648 2556 Bunker (STS) Notification..exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bunker (STS) Notification..exe"C:\Users\Admin\AppData\Local\Temp\Bunker (STS) Notification..exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\Bunker (STS) Notification..exe"C:\Users\Admin\AppData\Local\Temp\Bunker (STS) Notification..exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2556 -s 1043⤵
- Program crash
PID:2648
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9