Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24/02/2025, 16:26
Static task
static1
Behavioral task
behavioral1
Sample
Employee Performance Report.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Employee Performance Report.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250217-en
General
-
Target
Employee Performance Report.exe
-
Size
603KB
-
MD5
1da8315a94f0b1d6ea869d4547ad85ea
-
SHA1
7990c6e02172f81cbd171ac66f5f61fc0e23d696
-
SHA256
226beb95ef900ee4bd47d0a20f69d8f83cf3f76ebe397b1fa21863e71fd8f29f
-
SHA512
724914b2b297d4591ca56e6c4f582d4580e06e7bb9d8c213720d3a46d36714cbe43cd25521a87f72049d803b2272fd1749812ac4ecdba439c0adade0764ca65b
-
SSDEEP
12288:5UVC9GIaG5ez1SjybpA3K6af5C0FwoZNqF9AUiDeDx3E:KVzK5ez10ya3qfLwo2qDeDB
Malware Config
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Loads dropped DLL 2 IoCs
pid Process 2416 Employee Performance Report.exe 2416 Employee Performance Report.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2416 Employee Performance Report.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2752 2572 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Employee Performance Report.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Employee Performance Report.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2416 Employee Performance Report.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2572 2416 Employee Performance Report.exe 30 PID 2416 wrote to memory of 2572 2416 Employee Performance Report.exe 30 PID 2416 wrote to memory of 2572 2416 Employee Performance Report.exe 30 PID 2416 wrote to memory of 2572 2416 Employee Performance Report.exe 30 PID 2416 wrote to memory of 2572 2416 Employee Performance Report.exe 30 PID 2572 wrote to memory of 2752 2572 Employee Performance Report.exe 31 PID 2572 wrote to memory of 2752 2572 Employee Performance Report.exe 31 PID 2572 wrote to memory of 2752 2572 Employee Performance Report.exe 31 PID 2572 wrote to memory of 2752 2572 Employee Performance Report.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Employee Performance Report.exe"C:\Users\Admin\AppData\Local\Temp\Employee Performance Report.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\Employee Performance Report.exe"C:\Users\Admin\AppData\Local\Temp\Employee Performance Report.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2572 -s 1043⤵
- Program crash
PID:2752
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9