Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-05-2022 18:41

General

  • Target

    REMITTAN.exe

  • Size

    104KB

  • MD5

    a5227202babf335d14eec4a0a497f62c

  • SHA1

    b1ccb23abcaf2271167b9e7534e40512d8a36723

  • SHA256

    e761de2471fe1811d6a545231c1aa3d6b8065f0157af871808d2443c8c61dd09

  • SHA512

    b46ed3cbc786d997153be17ed7e1df5f08ed5525a09d7b824ff94dd4cca20c98ce7d015fb09ff2bca18bfeff81c3502fb4d6ba18714e5cc76b34e05cc98a16c1

Malware Config

Extracted

Family

guloader

C2

https://twadatabase.com/uj/newsamcav_HgMSY69.bin

xor.base64

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Guloader Payload 3 IoCs
  • Checks QEMU agent state file 2 TTPs 2 IoCs

    Checks state file used by QEMU agent, possibly to detect virtualization.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\REMITTAN.exe
    "C:\Users\Admin\AppData\Local\Temp\REMITTAN.exe"
    1⤵
    • Checks QEMU agent state file
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4576
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
      "C:\Users\Admin\AppData\Local\Temp\REMITTAN.exe"
      2⤵
      • Checks QEMU agent state file
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Modifies system certificate store
      PID:3052

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

1
T1012

Virtualization/Sandbox Evasion

1
T1497

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3052-134-0x0000000000000000-mapping.dmp
  • memory/3052-136-0x0000000001150000-0x0000000001250000-memory.dmp
    Filesize

    1024KB

  • memory/3052-137-0x00007FF8D8530000-0x00007FF8D8725000-memory.dmp
    Filesize

    2.0MB

  • memory/3052-138-0x0000000076F40000-0x00000000770E3000-memory.dmp
    Filesize

    1.6MB

  • memory/3052-139-0x0000000076F40000-0x00000000770E3000-memory.dmp
    Filesize

    1.6MB

  • memory/4576-132-0x0000000002080000-0x000000000208D000-memory.dmp
    Filesize

    52KB

  • memory/4576-133-0x00007FF8D8530000-0x00007FF8D8725000-memory.dmp
    Filesize

    2.0MB

  • memory/4576-135-0x0000000076F40000-0x00000000770E3000-memory.dmp
    Filesize

    1.6MB