Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
17/04/2025, 09:47
Static task
static1
Behavioral task
behavioral1
Sample
doc1172432.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
doc1172432.exe
Resource
win11-20250410-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win11-20250410-en
General
-
Target
doc1172432.exe
-
Size
722KB
-
MD5
a27844538feaff20e4fbe39992338bbe
-
SHA1
d769586f66753fc8507150e0acec662920d0d7b0
-
SHA256
fb84f716815f754bb0d14c94098da7d16ac3ff6caae85d110f0f96c8fb83fe24
-
SHA512
65c1563c62fb8b508dbe722690435e600e4ad97f0beff06876e852953b5d8961cf47afaf8f285fd154a0175fbd14de035e59011d2f3e31823fd3c20ab92f092a
-
SSDEEP
12288:yY/5cwRCTU62skVx5eIqBfwYiGUxiWovro7XrXxqCzh+iKwvQNNux+/XH7P4A3D:yY/5XfgYx5wKGSiW+QrXMCHx+PT4Az
Malware Config
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Loads dropped DLL 2 IoCs
pid Process 2216 doc1172432.exe 2216 doc1172432.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 drive.google.com 2 drive.google.com -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Objectee.ini doc1172432.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2216 doc1172432.exe 4748 doc1172432.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\resources\0409\otto\asynchronisms.bin doc1172432.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language doc1172432.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language doc1172432.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2216 doc1172432.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2216 wrote to memory of 4748 2216 doc1172432.exe 79 PID 2216 wrote to memory of 4748 2216 doc1172432.exe 79 PID 2216 wrote to memory of 4748 2216 doc1172432.exe 79 PID 2216 wrote to memory of 4748 2216 doc1172432.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\doc1172432.exe"C:\Users\Admin\AppData\Local\Temp\doc1172432.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\doc1172432.exe"C:\Users\Admin\AppData\Local\Temp\doc1172432.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4748
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88