File name:

c61fc49f3c2ca475a85c75db00efc5c25a549dae22546fbc8c85c56f6f40277e.exe

Full analysis: https://app.any.run/tasks/761b59b9-941f-467f-bbd6-891ab835cae3
Verdict: Malicious activity
Threats:

GuLoader is an advanced downloader written in shellcode. It’s used by criminals to distribute other malware, notably trojans, on a large scale. It’s infamous for using anti-detection and anti-analysis capabilities.

Analysis date: January 29, 2024, 05:27:46
OS: Windows 7 Professional Service Pack 1 (build: 7601, 64 bit)
Tags:
guloader
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

1D6DEFF19F2F9338D04B813B854BBA94

SHA1:

6F664A2A1F48EF7F72BE65D9ABCF00B60218DC48

SHA256:

C61FC49F3C2CA475A85C75DB00EFC5C25A549DAE22546FBC8C85C56F6F40277E

SSDEEP:

12288:d6njyXwyyyyynyyyyyy6yyoyKYhlyyW/qqfbZiFKEvIUW6T8UCS1Gs9xBy2:Ko2Xg/qqTZi4EvIUpT8XS1Gs9xBy2

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • GULOADER has been detected (YARA)

      • c61fc49f3c2ca475a85c75db00efc5c25a549dae22546fbc8c85c56f6f40277e.exe (PID: 1640)
  • SUSPICIOUS

    • Malware-specific behavior (creating "System.dll" in Temp)

      • c61fc49f3c2ca475a85c75db00efc5c25a549dae22546fbc8c85c56f6f40277e.exe (PID: 1640)
    • The process creates files with name similar to system file names

      • c61fc49f3c2ca475a85c75db00efc5c25a549dae22546fbc8c85c56f6f40277e.exe (PID: 1640)
    • Executable content was dropped or overwritten

      • c61fc49f3c2ca475a85c75db00efc5c25a549dae22546fbc8c85c56f6f40277e.exe (PID: 1640)
  • INFO

    • Checks supported languages

      • c61fc49f3c2ca475a85c75db00efc5c25a549dae22546fbc8c85c56f6f40277e.exe (PID: 1640)
    • Reads the computer name

      • c61fc49f3c2ca475a85c75db00efc5c25a549dae22546fbc8c85c56f6f40277e.exe (PID: 1640)
    • Create files in a temporary directory

      • c61fc49f3c2ca475a85c75db00efc5c25a549dae22546fbc8c85c56f6f40277e.exe (PID: 1640)
    • Drops the executable file immediately after the start

      • c61fc49f3c2ca475a85c75db00efc5c25a549dae22546fbc8c85c56f6f40277e.exe (PID: 1640)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

guloader

(PID) Process(1640) c61fc49f3c2ca475a85c75db00efc5c25a549dae22546fbc8c85c56f6f40277e.exe
Strings (5)C:\P`#jo)-&C gj
C:\Program Files\Qemu-ga)
N9u w
Np
SYST+oL'AwG 
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2016:12:11 22:50:41+01:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 25088
InitializedDataSize: 141824
UninitializedDataSize: 2048
EntryPoint: 0x32fe
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 3.2.0.0
ProductVersionNumber: 3.2.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
FileVersion: 3.2.0.0
LegalTrademarks: alkvantors unpedestal traditionizes
ProductVersion: 3.2.0.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #GULOADER c61fc49f3c2ca475a85c75db00efc5c25a549dae22546fbc8c85c56f6f40277e.exe

Process information

PID
CMD
Path
Indicators
Parent process
1640"C:\Users\admin\AppData\Local\Temp\c61fc49f3c2ca475a85c75db00efc5c25a549dae22546fbc8c85c56f6f40277e.exe" C:\Users\admin\AppData\Local\Temp\c61fc49f3c2ca475a85c75db00efc5c25a549dae22546fbc8c85c56f6f40277e.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
3.2.0.0
Modules
Images
c:\users\admin\appdata\local\temp\c61fc49f3c2ca475a85c75db00efc5c25a549dae22546fbc8c85c56f6f40277e.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
guloader
(PID) Process(1640) c61fc49f3c2ca475a85c75db00efc5c25a549dae22546fbc8c85c56f6f40277e.exe
Strings (5)C:\P`#jo)-&C gj
C:\Program Files\Qemu-ga)
N9u w
Np
SYST+oL'AwG 
Total events
689
Read events
686
Write events
3
Delete events
0

Modification events

(PID) Process:(1640) c61fc49f3c2ca475a85c75db00efc5c25a549dae22546fbc8c85c56f6f40277e.exeKey:HKEY_CURRENT_USER\Software\cryptonemiales\anfgter
Operation:writeName:pityocampa
Value:
FF80B4B1
(PID) Process:(1640) c61fc49f3c2ca475a85c75db00efc5c25a549dae22546fbc8c85c56f6f40277e.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\klamreabernes\Uninstall\margineret\festivitassen
Operation:writeName:Asylsgerne
Value:
1
Executable files
2
Suspicious files
1
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
1640c61fc49f3c2ca475a85c75db00efc5c25a549dae22546fbc8c85c56f6f40277e.exeC:\Users\admin\Costean\rekordprstation\Penises.Rubbinary
MD5:EF725E54799ED1860A3F7B383579BBED
SHA256:9753741DA37A352334BEA87E739111A7F61D39E2543BB9E5756C55C98339A4D9
1640c61fc49f3c2ca475a85c75db00efc5c25a549dae22546fbc8c85c56f6f40277e.exeC:\Users\admin\Costean\rekordprstation\tandlgen\Beroligendes\Sassies\keywords.txttext
MD5:4D3C8D141484BBB0B8BE03C13894EC9F
SHA256:C74E743057BFB38A767F3666DF1D16587E2E529A070D1621BE0E737366011471
1640c61fc49f3c2ca475a85c75db00efc5c25a549dae22546fbc8c85c56f6f40277e.exeC:\Users\admin\AppData\Local\Temp\nsh652.tmp\System.dllexecutable
MD5:17ED1C86BD67E78ADE4712BE48A7D2BD
SHA256:BD046E6497B304E4EA4AB102CAB2B1F94CE09BDE0EEBBA4C59942A732679E4EB
1640c61fc49f3c2ca475a85c75db00efc5c25a549dae22546fbc8c85c56f6f40277e.exeC:\Users\admin\Costean\rekordprstation\tandlgen\Beroligendes\Sassies\vtablog.dllexecutable
MD5:35119E61479373BA5D7433F106556E79
SHA256:F21D9DE02C67E51BB9F7163F676F2D4710B2BEFAE04FD0751A63CF1278C48A3C
1640c61fc49f3c2ca475a85c75db00efc5c25a549dae22546fbc8c85c56f6f40277e.exeC:\Users\admin\Costean\rekordprstation\tandlgen\Beroligendes\Sassies\x-office-spreadsheet-template.pngimage
MD5:7F1FF962A47C9323D55DFF2E96545DB4
SHA256:44F7A24A21DB132E8D738B07B25E48D454DB8370A39E7EF76114F565099D6275
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
5
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
352
svchost.exe
224.0.0.252:5355
unknown
1220
svchost.exe
239.255.255.250:3702
whitelisted

DNS requests

No data

Threats

No threats detected
No debug info