Analysis

  • max time kernel
    145s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    01-02-2022 06:13

General

  • Target

    5e7792550edc1085dfffcf3dad7dbc31e164c7149abdce5bbaae0715106a2e1c.exe

  • Size

    80KB

  • MD5

    6245a28f7c93c175879998bf0312809d

  • SHA1

    aa00c75bcb92bb3286e6e8b10c4d40135db3a2a6

  • SHA256

    5e7792550edc1085dfffcf3dad7dbc31e164c7149abdce5bbaae0715106a2e1c

  • SHA512

    0f1eaad3b05a43cc43272d96847882c3eddae3b953b10f875bd67d550b78cbc6eb6cc89e7f000f0b9ec88c78b13e30fc79b1f6645b2bc23d28e8f8084bb589d4

Malware Config

Extracted

Family

guloader

C2

https://drive.google.com/uc?export=download&id=1Q0Ltq2Kw5sxwS2JWRYNfsyrv58mrj4ks

xor.base64

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Guloader Payload 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e7792550edc1085dfffcf3dad7dbc31e164c7149abdce5bbaae0715106a2e1c.exe
    "C:\Users\Admin\AppData\Local\Temp\5e7792550edc1085dfffcf3dad7dbc31e164c7149abdce5bbaae0715106a2e1c.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1276
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
      "C:\Users\Admin\AppData\Local\Temp\5e7792550edc1085dfffcf3dad7dbc31e164c7149abdce5bbaae0715106a2e1c.exe"
      2⤵
        PID:1360
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
        "C:\Users\Admin\AppData\Local\Temp\5e7792550edc1085dfffcf3dad7dbc31e164c7149abdce5bbaae0715106a2e1c.exe"
        2⤵
          PID:760
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
          "C:\Users\Admin\AppData\Local\Temp\5e7792550edc1085dfffcf3dad7dbc31e164c7149abdce5bbaae0715106a2e1c.exe"
          2⤵
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          PID:720

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      1
      T1112

      Command and Control

      Web Service

      1
      T1102

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/720-65-0x0000000000090000-0x0000000000190000-memory.dmp
        Filesize

        1024KB

      • memory/720-66-0x0000000076D50000-0x0000000076EF9000-memory.dmp
        Filesize

        1.7MB

      • memory/720-67-0x0000000076F30000-0x00000000770B0000-memory.dmp
        Filesize

        1.5MB

      • memory/1276-57-0x00000000001D0000-0x00000000001DA000-memory.dmp
        Filesize

        40KB

      • memory/1276-58-0x0000000076D50000-0x0000000076EF9000-memory.dmp
        Filesize

        1.7MB

      • memory/1276-59-0x0000000076F30000-0x00000000770B0000-memory.dmp
        Filesize

        1.5MB

      • memory/1276-61-0x00000000756C1000-0x00000000756C3000-memory.dmp
        Filesize

        8KB