Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2025, 05:48
Static task
static1
Behavioral task
behavioral1
Sample
REVISED ORDER.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
REVISED ORDER.exe
Resource
win10v2004-20250314-en
General
-
Target
REVISED ORDER.exe
-
Size
216KB
-
MD5
5f5a1aaf1ee00e8b0b0b6a62713053a2
-
SHA1
0caccf489130536d51fa8b210b170434d8b4e388
-
SHA256
7ab96517f6852c124c82edf441496b2f005b11a4d1feb92f9cbfa2a2bffd1acb
-
SHA512
6f3138f02db278e4390d3b37bc1c84acb3d92052c290ffc2c732052fa273255f0de4e3b93b4c4f9cf48a7e95bb9a1d37adb2aa6ab6cca4467f36069d3b6086ab
-
SSDEEP
1536:SKP5h81dkoxFBD8OXZ4zpS8JhHnF9YdGKyj2u2sOqCKjMbx3xxAOBT:5P5uDgOeFJJJItyStqybLKOBT
Malware Config
Extracted
guloader
http://kiencuonghotel.vn/3month_RwHwwlGA208.bin
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Checks QEMU agent state file 2 TTPs 2 IoCs
Checks state file used by QEMU agent, possibly to detect virtualization.
description ioc Process File opened (read-only) C:\ProgramData\qemu-ga\qga.state REVISED ORDER.exe File opened (read-only) C:\ProgramData\qemu-ga\qga.state REVISED ORDER.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4724 REVISED ORDER.exe 3704 REVISED ORDER.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4724 set thread context of 3704 4724 REVISED ORDER.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REVISED ORDER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REVISED ORDER.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4724 REVISED ORDER.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4724 REVISED ORDER.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4724 wrote to memory of 3704 4724 REVISED ORDER.exe 93 PID 4724 wrote to memory of 3704 4724 REVISED ORDER.exe 93 PID 4724 wrote to memory of 3704 4724 REVISED ORDER.exe 93 PID 4724 wrote to memory of 3704 4724 REVISED ORDER.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\REVISED ORDER.exe"C:\Users\Admin\AppData\Local\Temp\REVISED ORDER.exe"1⤵
- Checks QEMU agent state file
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\REVISED ORDER.exe"C:\Users\Admin\AppData\Local\Temp\REVISED ORDER.exe"2⤵
- Checks QEMU agent state file
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3704
-