| File name: | c61fc49f3c2ca475a85c75db00efc5c25a549dae22546fbc8c85c56f6f40277e.exe |
| Full analysis: | https://app.any.run/tasks/761b59b9-941f-467f-bbd6-891ab835cae3 |
| Verdict: | Malicious activity |
| Threats: | GuLoader is an advanced downloader written in shellcode. It’s used by criminals to distribute other malware, notably trojans, on a large scale. It’s infamous for using anti-detection and anti-analysis capabilities. |
| Analysis date: | January 29, 2024, 05:27:46 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive |
| MD5: | 1D6DEFF19F2F9338D04B813B854BBA94 |
| SHA1: | 6F664A2A1F48EF7F72BE65D9ABCF00B60218DC48 |
| SHA256: | C61FC49F3C2CA475A85C75DB00EFC5C25A549DAE22546FBC8C85C56F6F40277E |
| SSDEEP: | 12288:d6njyXwyyyyynyyyyyy6yyoyKYhlyyW/qqfbZiFKEvIUW6T8UCS1Gs9xBy2:Ko2Xg/qqTZi4EvIUpT8XS1Gs9xBy2 |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2016:12:11 22:50:41+01:00 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 6 |
| CodeSize: | 25088 |
| InitializedDataSize: | 141824 |
| UninitializedDataSize: | 2048 |
| EntryPoint: | 0x32fe |
| OSVersion: | 4 |
| ImageVersion: | 6 |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 3.2.0.0 |
| ProductVersionNumber: | 3.2.0.0 |
| FileFlagsMask: | 0x0000 |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Windows, Latin1 |
| FileVersion: | 3.2.0.0 |
| LegalTrademarks: | alkvantors unpedestal traditionizes |
| ProductVersion: | 3.2.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1640 | "C:\Users\admin\AppData\Local\Temp\c61fc49f3c2ca475a85c75db00efc5c25a549dae22546fbc8c85c56f6f40277e.exe" | C:\Users\admin\AppData\Local\Temp\c61fc49f3c2ca475a85c75db00efc5c25a549dae22546fbc8c85c56f6f40277e.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Version: 3.2.0.0 Modules
guloader(PID) Process(1640) c61fc49f3c2ca475a85c75db00efc5c25a549dae22546fbc8c85c56f6f40277e.exe Strings (5)C:\P`#jo)-&C gj C:\Program Files\Qemu-ga) N9u w Np SYST+oL'AwG | |||||||||||||||
| (PID) Process: | (1640) c61fc49f3c2ca475a85c75db00efc5c25a549dae22546fbc8c85c56f6f40277e.exe | Key: | HKEY_CURRENT_USER\Software\cryptonemiales\anfgter |
| Operation: | write | Name: | pityocampa |
Value: FF80B4B1 | |||
| (PID) Process: | (1640) c61fc49f3c2ca475a85c75db00efc5c25a549dae22546fbc8c85c56f6f40277e.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\klamreabernes\Uninstall\margineret\festivitassen |
| Operation: | write | Name: | Asylsgerne |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1640 | c61fc49f3c2ca475a85c75db00efc5c25a549dae22546fbc8c85c56f6f40277e.exe | C:\Users\admin\Costean\rekordprstation\Penises.Rub | binary | |
MD5:EF725E54799ED1860A3F7B383579BBED | SHA256:9753741DA37A352334BEA87E739111A7F61D39E2543BB9E5756C55C98339A4D9 | |||
| 1640 | c61fc49f3c2ca475a85c75db00efc5c25a549dae22546fbc8c85c56f6f40277e.exe | C:\Users\admin\Costean\rekordprstation\tandlgen\Beroligendes\Sassies\keywords.txt | text | |
MD5:4D3C8D141484BBB0B8BE03C13894EC9F | SHA256:C74E743057BFB38A767F3666DF1D16587E2E529A070D1621BE0E737366011471 | |||
| 1640 | c61fc49f3c2ca475a85c75db00efc5c25a549dae22546fbc8c85c56f6f40277e.exe | C:\Users\admin\AppData\Local\Temp\nsh652.tmp\System.dll | executable | |
MD5:17ED1C86BD67E78ADE4712BE48A7D2BD | SHA256:BD046E6497B304E4EA4AB102CAB2B1F94CE09BDE0EEBBA4C59942A732679E4EB | |||
| 1640 | c61fc49f3c2ca475a85c75db00efc5c25a549dae22546fbc8c85c56f6f40277e.exe | C:\Users\admin\Costean\rekordprstation\tandlgen\Beroligendes\Sassies\vtablog.dll | executable | |
MD5:35119E61479373BA5D7433F106556E79 | SHA256:F21D9DE02C67E51BB9F7163F676F2D4710B2BEFAE04FD0751A63CF1278C48A3C | |||
| 1640 | c61fc49f3c2ca475a85c75db00efc5c25a549dae22546fbc8c85c56f6f40277e.exe | C:\Users\admin\Costean\rekordprstation\tandlgen\Beroligendes\Sassies\x-office-spreadsheet-template.png | image | |
MD5:7F1FF962A47C9323D55DFF2E96545DB4 | SHA256:44F7A24A21DB132E8D738B07B25E48D454DB8370A39E7EF76114F565099D6275 | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
352 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
1220 | svchost.exe | 239.255.255.250:3702 | — | — | — | whitelisted |