Analysis

  • max time kernel
    171s
  • max time network
    198s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    21-01-2022 23:15

General

  • Target

    B2020006307357.PDF...exe

  • Size

    52KB

  • MD5

    42e026716bcf95406beca59b834a1432

  • SHA1

    9474067350e0211faff4eb0c14dc2982897ee6f9

  • SHA256

    1dd138afd050e4d29b20494c3bd607685295f2cd8217c1e6ddd9b47e54961f38

  • SHA512

    01873ec441a283c55948052c4a835c7fd5246f695ed955239168dc583299c1bf58536f80d77e0a4c76e19ca04e51ef9ce927c806489bf1b122d0b6ad44d1df9b

Malware Config

Extracted

Family

guloader

C2

https://drive.google.com/uc?export=download&id=1nxID3cbZ3N3YCfZ5Mt-WYptrBK_9HFWH

xor.base64

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Guloader Payload 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\B2020006307357.PDF...exe
    "C:\Users\Admin\AppData\Local\Temp\B2020006307357.PDF...exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2056
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
      "C:\Users\Admin\AppData\Local\Temp\B2020006307357.PDF...exe"
      2⤵
        PID:3388
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
        "C:\Users\Admin\AppData\Local\Temp\B2020006307357.PDF...exe"
        2⤵
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        PID:3372

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2056-120-0x00000000022C0000-0x00000000022C8000-memory.dmp
      Filesize

      32KB

    • memory/2056-121-0x00007FF9C9E30000-0x00007FF9CA00B000-memory.dmp
      Filesize

      1.9MB

    • memory/2056-122-0x0000000077110000-0x000000007729E000-memory.dmp
      Filesize

      1.6MB

    • memory/3372-123-0x0000000000700000-0x00000000009F0000-memory.dmp
      Filesize

      2.9MB

    • memory/3372-124-0x00007FF9C9E30000-0x00007FF9CA00B000-memory.dmp
      Filesize

      1.9MB

    • memory/3372-125-0x0000000077110000-0x000000007729E000-memory.dmp
      Filesize

      1.6MB