Analysis
-
max time kernel
146s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2025, 07:18
Static task
static1
Behavioral task
behavioral1
Sample
KONTRAKT.BAT.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
KONTRAKT.BAT.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250313-en
General
-
Target
KONTRAKT.BAT.exe
-
Size
831KB
-
MD5
b0c7ab10be42ea7a840c7f51b1c95f81
-
SHA1
532dd15c1086b8d2af0ee678797282742385558e
-
SHA256
e9887c4fd1a66a2c7efaf6c7cb52765b4368a8cbb225df248f2fddc6d20f378b
-
SHA512
475a90ccbc57d0ae08f9a1a19a6a0a9c13175712512eaa2895b905feeced64446f74951afd1760d61c0e62d82d8b056b5e95532ea49395c72a14bc729187f072
-
SSDEEP
24576:mdYBcYrRLg2AYpsmF0tlrluJzu5IOImYGyFGAUoTJTvuhyR:mqcYrRLgEUlrAyaO7dyFGAHFvsyR
Malware Config
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Loads dropped DLL 1 IoCs
pid Process 3624 KONTRAKT.BAT.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3624 KONTRAKT.BAT.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KONTRAKT.BAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KONTRAKT.BAT.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3624 KONTRAKT.BAT.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3624 wrote to memory of 1428 3624 KONTRAKT.BAT.exe 104 PID 3624 wrote to memory of 1428 3624 KONTRAKT.BAT.exe 104 PID 3624 wrote to memory of 1428 3624 KONTRAKT.BAT.exe 104 PID 3624 wrote to memory of 1428 3624 KONTRAKT.BAT.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\KONTRAKT.BAT.exe"C:\Users\Admin\AppData\Local\Temp\KONTRAKT.BAT.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\KONTRAKT.BAT.exe"C:\Users\Admin\AppData\Local\Temp\KONTRAKT.BAT.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD59625d5b1754bc4ff29281d415d27a0fd
SHA180e85afc5cccd4c0a3775edbb90595a1a59f5ce0
SHA256c2f405d7402f815d0c3fadd9a50f0bbbb1bab9aa38fe347823478a2587299448
SHA512dce52b640897c2e8dbfd0a1472d5377fa91fb9cf1aeff62604d014bccbe5b56af1378f173132abeb0edd18c225b9f8f5e3d3e72434aed946661e036c779f165b