Resubmissions
13/04/2025, 09:55
250413-lx71lstjt7 1013/04/2025, 09:52
250413-lv39mstvbz 1013/04/2025, 07:04
250413-hv884s1vd1 10Analysis
-
max time kernel
23s -
max time network
23s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
13/04/2025, 09:55
Static task
static1
Behavioral task
behavioral1
Sample
virusshare/3/VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe
Resource
win10v2004-20250410-en
General
-
Target
virusshare/3/VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe
-
Size
64KB
-
MD5
4aa5734fe9c86184f931f4ddaf2d4d7b
-
SHA1
a066ccad76f3c63d053cd68ac8692d4f4acf82ac
-
SHA256
2e18ad3e470b97415beb2cdb8e3ef7510bad21f0a5add020a7f9343dd959eeaa
-
SHA512
7355ffd3fc59af49af1d57f5327c7442a12c8e5ddc6ec9e176cc27fd4986cd6182f5f6ce91f892c07029efcac37f90d4dd077b6bb226b54c40621b94987a044c
-
SSDEEP
384:rdP9JIA7uJ1wK2xBpHbVbl+NGYD90pSCfZziEKffhaekBfdReVwoGHdRsArr2rOR:R9JIqNl/SSrrpBfiIdRsorZucnjtsq
Malware Config
Extracted
guloader
https://eficadgdl.com/well/Omitted-Credentials_encrypted_6A17930.bin
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4880 erythroph.exe 4692 erythroph.exe 5752 erythroph.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2645532622-3298555945-705856666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2645532622-3298555945-705856666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2645532622-3298555945-705856666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2645532622-3298555945-705856666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 4736 VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe 732 RegAsm.exe 4880 erythroph.exe 4400 RegAsm.exe 4692 erythroph.exe 5344 RegAsm.exe 5752 erythroph.exe 1456 RegAsm.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4736 set thread context of 732 4736 VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe 87 PID 4880 set thread context of 4400 4880 erythroph.exe 98 PID 4692 set thread context of 5344 4692 erythroph.exe 105 PID 5752 set thread context of 1456 5752 erythroph.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious behavior: MapViewOfSection 10 IoCs
pid Process 4736 VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe 4880 erythroph.exe 4880 erythroph.exe 4880 erythroph.exe 4880 erythroph.exe 4880 erythroph.exe 4692 erythroph.exe 4692 erythroph.exe 5752 erythroph.exe 5752 erythroph.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4736 VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe 4880 erythroph.exe 4692 erythroph.exe 5752 erythroph.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 4736 wrote to memory of 732 4736 VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe 87 PID 4736 wrote to memory of 732 4736 VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe 87 PID 4736 wrote to memory of 732 4736 VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe 87 PID 4736 wrote to memory of 732 4736 VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe 87 PID 5712 wrote to memory of 4880 5712 cmd.exe 91 PID 5712 wrote to memory of 4880 5712 cmd.exe 91 PID 5712 wrote to memory of 4880 5712 cmd.exe 91 PID 4880 wrote to memory of 5028 4880 erythroph.exe 94 PID 4880 wrote to memory of 5028 4880 erythroph.exe 94 PID 4880 wrote to memory of 5028 4880 erythroph.exe 94 PID 4880 wrote to memory of 3484 4880 erythroph.exe 95 PID 4880 wrote to memory of 3484 4880 erythroph.exe 95 PID 4880 wrote to memory of 3484 4880 erythroph.exe 95 PID 4880 wrote to memory of 5840 4880 erythroph.exe 96 PID 4880 wrote to memory of 5840 4880 erythroph.exe 96 PID 4880 wrote to memory of 5840 4880 erythroph.exe 96 PID 4880 wrote to memory of 4344 4880 erythroph.exe 97 PID 4880 wrote to memory of 4344 4880 erythroph.exe 97 PID 4880 wrote to memory of 4344 4880 erythroph.exe 97 PID 4880 wrote to memory of 4400 4880 erythroph.exe 98 PID 4880 wrote to memory of 4400 4880 erythroph.exe 98 PID 4880 wrote to memory of 4400 4880 erythroph.exe 98 PID 4880 wrote to memory of 4400 4880 erythroph.exe 98 PID 4484 wrote to memory of 4692 4484 cmd.exe 103 PID 4484 wrote to memory of 4692 4484 cmd.exe 103 PID 4484 wrote to memory of 4692 4484 cmd.exe 103 PID 4692 wrote to memory of 4444 4692 erythroph.exe 104 PID 4692 wrote to memory of 4444 4692 erythroph.exe 104 PID 4692 wrote to memory of 4444 4692 erythroph.exe 104 PID 4692 wrote to memory of 5344 4692 erythroph.exe 105 PID 4692 wrote to memory of 5344 4692 erythroph.exe 105 PID 4692 wrote to memory of 5344 4692 erythroph.exe 105 PID 4692 wrote to memory of 5344 4692 erythroph.exe 105 PID 4608 wrote to memory of 5752 4608 cmd.exe 109 PID 4608 wrote to memory of 5752 4608 cmd.exe 109 PID 4608 wrote to memory of 5752 4608 cmd.exe 109 PID 5752 wrote to memory of 4800 5752 erythroph.exe 110 PID 5752 wrote to memory of 4800 5752 erythroph.exe 110 PID 5752 wrote to memory of 4800 5752 erythroph.exe 110 PID 5752 wrote to memory of 1456 5752 erythroph.exe 111 PID 5752 wrote to memory of 1456 5752 erythroph.exe 111 PID 5752 wrote to memory of 1456 5752 erythroph.exe 111 PID 5752 wrote to memory of 1456 5752 erythroph.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\virusshare\3\VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe"C:\Users\Admin\AppData\Local\Temp\virusshare\3\VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\virusshare\3\VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe"2⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:732
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5712 -
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵PID:5028
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵PID:3484
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵PID:5840
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵PID:4344
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4400
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵PID:4444
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5344
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5752 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵PID:4800
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1456
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD54aa5734fe9c86184f931f4ddaf2d4d7b
SHA1a066ccad76f3c63d053cd68ac8692d4f4acf82ac
SHA2562e18ad3e470b97415beb2cdb8e3ef7510bad21f0a5add020a7f9343dd959eeaa
SHA5127355ffd3fc59af49af1d57f5327c7442a12c8e5ddc6ec9e176cc27fd4986cd6182f5f6ce91f892c07029efcac37f90d4dd077b6bb226b54c40621b94987a044c