Overview
overview
10Static
static
10virusshare...87.exe
windows10-2004-x64
1virusshare...87.exe
windows11-21h2-x64
1virusshare...4d.exe
windows10-2004-x64
5virusshare...4d.exe
windows11-21h2-x64
5virusshare...c9.xls
windows10-2004-x64
10virusshare...c9.xls
windows11-21h2-x64
10virusshare...f9.doc
windows10-2004-x64
10virusshare...f9.doc
windows11-21h2-x64
10virusshare...30.pdf
windows10-2004-x64
3virusshare...30.pdf
windows11-21h2-x64
3virusshare...re.exe
windows10-2004-x64
1virusshare...re.exe
windows11-21h2-x64
1virusshare...8d.exe
windows10-2004-x64
3virusshare...8d.exe
windows11-21h2-x64
3virusshare...fa.exe
windows10-2004-x64
3virusshare...fa.exe
windows11-21h2-x64
3virusshare...c8.doc
windows10-2004-x64
10virusshare...c8.doc
windows11-21h2-x64
10virusshare...03.doc
windows10-2004-x64
1virusshare...03.doc
windows11-21h2-x64
1virusshare...40.pdf
windows10-2004-x64
3virusshare...40.pdf
windows11-21h2-x64
3virusshare...ng.apk
android-9-x86
virusshare...ng.apk
android-10-x64
virusshare...ng.apk
android-11-x64
virusshare...4e.doc
windows10-2004-x64
1virusshare...4e.doc
windows11-21h2-x64
1virusshare...cd.pdf
windows10-2004-x64
3virusshare...cd.pdf
windows11-21h2-x64
3virusshare...7b.exe
windows10-2004-x64
10virusshare...7b.exe
windows11-21h2-x64
10virusshare...82.exe
windows10-2004-x64
3Resubmissions
16/04/2025, 23:23
250416-3dkjmsw1ds 1016/04/2025, 23:22
250416-3crxbs1ms5 1016/04/2025, 23:16
250416-29atms1ly8 1016/04/2025, 23:10
250416-2523bswzgx 1016/04/2025, 21:45
250416-1madxsvzg1 1016/04/2025, 21:28
250416-1be52azmt6 1016/04/2025, 21:16
250416-z4vkrazlz9 1016/04/2025, 21:06
250416-zx2eqavygy 10Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-es -
resource tags
arch:x64arch:x86image:win10v2004-20250410-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
16/04/2025, 23:23
Static task
static1
Behavioral task
behavioral1
Sample
virusshare/1/VirusShare_0a2d1ecedf3f79754aa2c18d62e75287.exe
Resource
win10v2004-20250314-es
Behavioral task
behavioral2
Sample
virusshare/1/VirusShare_0a2d1ecedf3f79754aa2c18d62e75287.exe
Resource
win11-20250410-es
Behavioral task
behavioral3
Sample
virusshare/1/VirusShare_0aee78510c46e3a200b6bc21ac1c954d.exe
Resource
win10v2004-20250314-es
Behavioral task
behavioral4
Sample
virusshare/1/VirusShare_0aee78510c46e3a200b6bc21ac1c954d.exe
Resource
win11-20250410-es
Behavioral task
behavioral5
Sample
virusshare/1/VirusShare_0fea640a7da27f365b3675f73626b9c9.xls
Resource
win10v2004-20250313-es
Behavioral task
behavioral6
Sample
virusshare/1/VirusShare_0fea640a7da27f365b3675f73626b9c9.xls
Resource
win11-20250410-es
Behavioral task
behavioral7
Sample
virusshare/1/VirusShare_1ba8249d8503c0cf7bc125588c43bef9.doc
Resource
win10v2004-20250410-es
Behavioral task
behavioral8
Sample
virusshare/1/VirusShare_1ba8249d8503c0cf7bc125588c43bef9.doc
Resource
win11-20250410-es
Behavioral task
behavioral9
Sample
virusshare/1/VirusShare_3cd9a967b67fe69351e390195ca7a430.pdf
Resource
win10v2004-20250410-es
Behavioral task
behavioral10
Sample
virusshare/1/VirusShare_3cd9a967b67fe69351e390195ca7a430.pdf
Resource
win11-20250410-es
Behavioral task
behavioral11
Sample
virusshare/1/malware.exe
Resource
win10v2004-20250314-es
Behavioral task
behavioral12
Sample
virusshare/1/malware.exe
Resource
win11-20250410-es
Behavioral task
behavioral13
Sample
virusshare/2/VirusShare_01b55404de50bd1a56343b2f316ff88d.exe
Resource
win10v2004-20250314-es
Behavioral task
behavioral14
Sample
virusshare/2/VirusShare_01b55404de50bd1a56343b2f316ff88d.exe
Resource
win11-20250410-es
Behavioral task
behavioral15
Sample
virusshare/2/VirusShare_1ad9a67240d5775395c45b64dd6529fa.exe
Resource
win10v2004-20250314-es
Behavioral task
behavioral16
Sample
virusshare/2/VirusShare_1ad9a67240d5775395c45b64dd6529fa.exe
Resource
win11-20250410-es
Behavioral task
behavioral17
Sample
virusshare/2/VirusShare_2fe5b00079aec2d8369a798230313ec8.doc
Resource
win10v2004-20250314-es
Behavioral task
behavioral18
Sample
virusshare/2/VirusShare_2fe5b00079aec2d8369a798230313ec8.doc
Resource
win11-20250410-es
Behavioral task
behavioral19
Sample
virusshare/2/VirusShare_3f0b1eed4b7b9ae05fab4d949843f103.doc
Resource
win10v2004-20250313-es
Behavioral task
behavioral20
Sample
virusshare/2/VirusShare_3f0b1eed4b7b9ae05fab4d949843f103.doc
Resource
win11-20250410-es
Behavioral task
behavioral21
Sample
virusshare/2/VirusShare_480ef02bb062a57724e1b3e14532a140.pdf
Resource
win10v2004-20250410-es
Behavioral task
behavioral22
Sample
virusshare/2/VirusShare_480ef02bb062a57724e1b3e14532a140.pdf
Resource
win11-20250410-es
Behavioral task
behavioral23
Sample
virusshare/2/wedding.apk
Resource
android-x86-arm-20240910-es
Behavioral task
behavioral24
Sample
virusshare/2/wedding.apk
Resource
android-x64-20240910-es
Behavioral task
behavioral25
Sample
virusshare/2/wedding.apk
Resource
android-x64-arm64-20240910-es
Behavioral task
behavioral26
Sample
virusshare/3/VirusShare_3fb34964fa7b8c6bfad8d960380ff04e.doc
Resource
win10v2004-20250314-es
Behavioral task
behavioral27
Sample
virusshare/3/VirusShare_3fb34964fa7b8c6bfad8d960380ff04e.doc
Resource
win11-20250410-es
Behavioral task
behavioral28
Sample
virusshare/3/VirusShare_4675e87be15585e66b0c88b833dd9ecd.pdf
Resource
win10v2004-20250410-es
Behavioral task
behavioral29
Sample
virusshare/3/VirusShare_4675e87be15585e66b0c88b833dd9ecd.pdf
Resource
win11-20250410-es
Behavioral task
behavioral30
Sample
virusshare/3/VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe
Resource
win10v2004-20250410-es
Behavioral task
behavioral31
Sample
virusshare/3/VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe
Resource
win11-20250410-es
Behavioral task
behavioral32
Sample
virusshare/3/VirusShare_5c8b670c503455baafbff400a446cf82.exe
Resource
win10v2004-20250314-es
General
-
Target
virusshare/3/VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe
-
Size
64KB
-
MD5
4aa5734fe9c86184f931f4ddaf2d4d7b
-
SHA1
a066ccad76f3c63d053cd68ac8692d4f4acf82ac
-
SHA256
2e18ad3e470b97415beb2cdb8e3ef7510bad21f0a5add020a7f9343dd959eeaa
-
SHA512
7355ffd3fc59af49af1d57f5327c7442a12c8e5ddc6ec9e176cc27fd4986cd6182f5f6ce91f892c07029efcac37f90d4dd077b6bb226b54c40621b94987a044c
-
SSDEEP
384:rdP9JIA7uJ1wK2xBpHbVbl+NGYD90pSCfZziEKffhaekBfdReVwoGHdRsArr2rOR:R9JIqNl/SSrrpBfiIdRsorZucnjtsq
Malware Config
Extracted
guloader
https://eficadgdl.com/well/Omitted-Credentials_encrypted_6A17930.bin
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2864 erythroph.exe 4484 erythroph.exe 5796 erythroph.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3630502724-2561614198-3854231964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3630502724-2561614198-3854231964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3630502724-2561614198-3854231964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3630502724-2561614198-3854231964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 4332 VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe 1464 RegAsm.exe 2864 erythroph.exe 4520 RegAsm.exe 4484 erythroph.exe 5420 RegAsm.exe 5796 erythroph.exe 4780 RegAsm.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4332 set thread context of 1464 4332 VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe 87 PID 2864 set thread context of 4520 2864 erythroph.exe 93 PID 4484 set thread context of 5420 4484 erythroph.exe 98 PID 5796 set thread context of 4780 5796 erythroph.exe 103 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4332 VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe 2864 erythroph.exe 2864 erythroph.exe 4484 erythroph.exe 5796 erythroph.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4332 VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe 2864 erythroph.exe 4484 erythroph.exe 5796 erythroph.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 4332 wrote to memory of 1464 4332 VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe 87 PID 4332 wrote to memory of 1464 4332 VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe 87 PID 4332 wrote to memory of 1464 4332 VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe 87 PID 4332 wrote to memory of 1464 4332 VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe 87 PID 2144 wrote to memory of 2864 2144 cmd.exe 91 PID 2144 wrote to memory of 2864 2144 cmd.exe 91 PID 2144 wrote to memory of 2864 2144 cmd.exe 91 PID 2864 wrote to memory of 4464 2864 erythroph.exe 92 PID 2864 wrote to memory of 4464 2864 erythroph.exe 92 PID 2864 wrote to memory of 4464 2864 erythroph.exe 92 PID 2864 wrote to memory of 4520 2864 erythroph.exe 93 PID 2864 wrote to memory of 4520 2864 erythroph.exe 93 PID 2864 wrote to memory of 4520 2864 erythroph.exe 93 PID 2864 wrote to memory of 4520 2864 erythroph.exe 93 PID 4816 wrote to memory of 4484 4816 cmd.exe 97 PID 4816 wrote to memory of 4484 4816 cmd.exe 97 PID 4816 wrote to memory of 4484 4816 cmd.exe 97 PID 4484 wrote to memory of 5420 4484 erythroph.exe 98 PID 4484 wrote to memory of 5420 4484 erythroph.exe 98 PID 4484 wrote to memory of 5420 4484 erythroph.exe 98 PID 4484 wrote to memory of 5420 4484 erythroph.exe 98 PID 3580 wrote to memory of 5796 3580 cmd.exe 102 PID 3580 wrote to memory of 5796 3580 cmd.exe 102 PID 3580 wrote to memory of 5796 3580 cmd.exe 102 PID 5796 wrote to memory of 4780 5796 erythroph.exe 103 PID 5796 wrote to memory of 4780 5796 erythroph.exe 103 PID 5796 wrote to memory of 4780 5796 erythroph.exe 103 PID 5796 wrote to memory of 4780 5796 erythroph.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\virusshare\3\VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe"C:\Users\Admin\AppData\Local\Temp\virusshare\3\VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\virusshare\3\VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe"2⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1464
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵PID:4464
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4520
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5420
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5796 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4780
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD54aa5734fe9c86184f931f4ddaf2d4d7b
SHA1a066ccad76f3c63d053cd68ac8692d4f4acf82ac
SHA2562e18ad3e470b97415beb2cdb8e3ef7510bad21f0a5add020a7f9343dd959eeaa
SHA5127355ffd3fc59af49af1d57f5327c7442a12c8e5ddc6ec9e176cc27fd4986cd6182f5f6ce91f892c07029efcac37f90d4dd077b6bb226b54c40621b94987a044c