Analysis

  • max time kernel
    151s
  • max time network
    165s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2022 05:28

General

  • Target

    SecuriteInfo.com.Trojan.KillProc2.9731.8373.22974.exe

  • Size

    460KB

  • MD5

    d389d3526bc35937d3ffc6d2109a876f

  • SHA1

    798e1b2fbea4b2d0b6826fb6c15daf2cc87ad58b

  • SHA256

    b598b61f5443239b8c51ebee3de95d33ebe57cf6f3250528fdd94810c3789a90

  • SHA512

    a5cd970a01c1a356c3345724d39655907d00e05c6698539a890351959b81ed30d378d11812a01f097e2a31e5d4eb271779a2ae86279fbb5fa1421c2766927432

  • SSDEEP

    1536:DWkc8UVJnMQLLI9m9CzsABLaYcfFvKr/63On6BpEoGiV:DN0JnMg8gCzsAFa5fFvKrMQ6BpEoG2

Malware Config

Extracted

Family

guloader

C2

https://drive.google.com/uc?export=download&id=1Qjrpw8RUpYAHmEluWbVlH_nfGfr3r4V-

https://www.sendspace.com/pro/dl/v4w6wl

xor.base64

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Guloader payload 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.KillProc2.9731.8373.22974.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.KillProc2.9731.8373.22974.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1904
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
      "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.KillProc2.9731.8373.22974.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Modifies system certificate store
      PID:1708

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1708-64-0x00000000772F0000-0x0000000077499000-memory.dmp
    Filesize

    1.7MB

  • memory/1708-70-0x00000000774D0000-0x0000000077650000-memory.dmp
    Filesize

    1.5MB

  • memory/1708-71-0x00000000774D0000-0x0000000077650000-memory.dmp
    Filesize

    1.5MB

  • memory/1708-60-0x000000000120B7DE-mapping.dmp
  • memory/1708-68-0x00000000774D0000-0x0000000077650000-memory.dmp
    Filesize

    1.5MB

  • memory/1708-63-0x0000000000130000-0x0000000000230000-memory.dmp
    Filesize

    1024KB

  • memory/1708-69-0x00000000774D0000-0x0000000077650000-memory.dmp
    Filesize

    1.5MB

  • memory/1904-62-0x00000000774D0000-0x0000000077650000-memory.dmp
    Filesize

    1.5MB

  • memory/1904-56-0x00000000003E0000-0x00000000003F0000-memory.dmp
    Filesize

    64KB

  • memory/1904-57-0x00000000772F0000-0x0000000077499000-memory.dmp
    Filesize

    1.7MB

  • memory/1904-67-0x00000000003E0000-0x00000000003F0000-memory.dmp
    Filesize

    64KB

  • memory/1904-59-0x00000000762D1000-0x00000000762D3000-memory.dmp
    Filesize

    8KB

  • memory/1904-72-0x00000000003E0000-0x00000000003F0000-memory.dmp
    Filesize

    64KB

  • memory/1904-73-0x00000000774D0000-0x0000000077650000-memory.dmp
    Filesize

    1.5MB