Analysis
-
max time kernel
148s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2025, 01:20
Static task
static1
Behavioral task
behavioral1
Sample
employee performance report.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
employee performance report.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250314-en
General
-
Target
employee performance report.exe
-
Size
1011KB
-
MD5
e5fe1c0aabcf82525765543518b10947
-
SHA1
51327f7690a266384123b9f2eb4a51b97638f2dd
-
SHA256
d30b99cefc552af16433fc29e1c02696677d8b2727677ed5fcac6465b419ad3d
-
SHA512
76f0b85daddeed0ef280bf5aeb6126bc0b5dfba9b01c99d5ae7f2f61eb371a2e8c42bed9d7e9bb7dcfcc1acf861a720856b541f6f56f35c2d9c800c42985c0a7
-
SSDEEP
24576:rkvVNzWWyMVtQSKkyt2Jfu+dUph4u+E83WB0N48cLpT15+G3:rmLFZVtQkyq2iUph4U83WBxZdpYu
Malware Config
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Loads dropped DLL 2 IoCs
pid Process 4116 employee performance report.exe 4116 employee performance report.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 25 drive.google.com 26 drive.google.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4116 employee performance report.exe 6028 employee performance report.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\bouts.ini employee performance report.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Sharer.cam employee performance report.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language employee performance report.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language employee performance report.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4116 employee performance report.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4116 wrote to memory of 6028 4116 employee performance report.exe 96 PID 4116 wrote to memory of 6028 4116 employee performance report.exe 96 PID 4116 wrote to memory of 6028 4116 employee performance report.exe 96 PID 4116 wrote to memory of 6028 4116 employee performance report.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\employee performance report.exe"C:\Users\Admin\AppData\Local\Temp\employee performance report.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\employee performance report.exe"C:\Users\Admin\AppData\Local\Temp\employee performance report.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34B
MD5c5b6ed57c78f93e1200a2b7f05af4d89
SHA1299326b64ab38fc50affed801b2959427e3b3853
SHA25670e7c4f9534d3ef250f0e2ad5cd2b68fba8eccba9e7d311e0c2ed08e6f340d5f
SHA5121895a78aa7c10c0642bbad00f82a5f869a1afa0581ff7d0e3fcd9070789c09d8bee216319ae3f5da5283bd9eb5c82fd8d1076f488f4ecd6b2b63e217f91b6a7e
-
Filesize
11KB
MD5ee260c45e97b62a5e42f17460d406068
SHA1df35f6300a03c4d3d3bd69752574426296b78695
SHA256e94a1f7bcd7e0d532b660d0af468eb3321536c3efdca265e61f9ec174b1aef27
SHA512a98f350d17c9057f33e5847462a87d59cbf2aaeda7f6299b0d49bb455e484ce4660c12d2eb8c4a0d21df523e729222bbd6c820bf25b081bc7478152515b414b3
-
Filesize
998B
MD50f16dbd4b748cad07e69e5af14870127
SHA12dbf73b43cd1cea0dc92d55309c04b8ae4bf2495
SHA256c3bd5b9820bf3ff832b35126443d40a33de763989c47961b5e89a32fcd58e687
SHA512551ad090448c026f1efb7fd70ff701dbe142a0a591f006a58c598c7538c9a6b2fc66a0ec0c1128e7f8285895d5a6b45f70ded7849128f05b6e6b4efbdd5c66ff