Analysis
-
max time kernel
298s -
max time network
298s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27/03/2025, 00:56
Static task
static1
Behavioral task
behavioral1
Sample
employee performance report.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
employee performance report.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250314-en
General
-
Target
employee performance report.exe
-
Size
1011KB
-
MD5
e5fe1c0aabcf82525765543518b10947
-
SHA1
51327f7690a266384123b9f2eb4a51b97638f2dd
-
SHA256
d30b99cefc552af16433fc29e1c02696677d8b2727677ed5fcac6465b419ad3d
-
SHA512
76f0b85daddeed0ef280bf5aeb6126bc0b5dfba9b01c99d5ae7f2f61eb371a2e8c42bed9d7e9bb7dcfcc1acf861a720856b541f6f56f35c2d9c800c42985c0a7
-
SSDEEP
24576:rkvVNzWWyMVtQSKkyt2Jfu+dUph4u+E83WB0N48cLpT15+G3:rmLFZVtQkyq2iUph4U83WBxZdpYu
Malware Config
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Loads dropped DLL 2 IoCs
pid Process 2172 employee performance report.exe 2172 employee performance report.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 drive.google.com 5 drive.google.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2172 employee performance report.exe 2328 employee performance report.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\bouts.ini employee performance report.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Sharer.cam employee performance report.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language employee performance report.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language employee performance report.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2172 employee performance report.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2328 2172 employee performance report.exe 31 PID 2172 wrote to memory of 2328 2172 employee performance report.exe 31 PID 2172 wrote to memory of 2328 2172 employee performance report.exe 31 PID 2172 wrote to memory of 2328 2172 employee performance report.exe 31 PID 2172 wrote to memory of 2328 2172 employee performance report.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\employee performance report.exe"C:\Users\Admin\AppData\Local\Temp\employee performance report.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\employee performance report.exe"C:\Users\Admin\AppData\Local\Temp\employee performance report.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34B
MD5c5b6ed57c78f93e1200a2b7f05af4d89
SHA1299326b64ab38fc50affed801b2959427e3b3853
SHA25670e7c4f9534d3ef250f0e2ad5cd2b68fba8eccba9e7d311e0c2ed08e6f340d5f
SHA5121895a78aa7c10c0642bbad00f82a5f869a1afa0581ff7d0e3fcd9070789c09d8bee216319ae3f5da5283bd9eb5c82fd8d1076f488f4ecd6b2b63e217f91b6a7e
-
Filesize
978B
MD5f7f22d598e62ea9247a2820c798e2ea4
SHA1cc3f669c4c2c40f44b94e9816809e3c3fa9441b5
SHA2566910bc7041185218b94dff34d4e4ab78533fc5a429cc2451b179011185e012ce
SHA512bee82143b7c4ed53ae4419519fc23cd307c402573089f3e4a0f5213d2e6923c882d0483f1e90d1d790613c7eaa96f0e0cd4e576496f72c38f5d634a2d2c7b1e8
-
Filesize
11KB
MD5ee260c45e97b62a5e42f17460d406068
SHA1df35f6300a03c4d3d3bd69752574426296b78695
SHA256e94a1f7bcd7e0d532b660d0af468eb3321536c3efdca265e61f9ec174b1aef27
SHA512a98f350d17c9057f33e5847462a87d59cbf2aaeda7f6299b0d49bb455e484ce4660c12d2eb8c4a0d21df523e729222bbd6c820bf25b081bc7478152515b414b3