Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
16-09-2020 16:43
Static task
static1
Behavioral task
behavioral1
Sample
17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe
Resource
win7
General
-
Target
17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe
-
Size
384KB
-
MD5
a81d104e7bb627a4d3a0f0b823e17581
-
SHA1
ddc6f577463ff140e525cf7f4a4f083406acd1f4
-
SHA256
17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894
-
SHA512
18bc43f92dd794655a26529634f3683d183c2b130b4ced99a276f389c0e3f3c6f03763c5681ec4c80744dda0699d63919d25333f56295729733a2b09b5283b32
Malware Config
Extracted
buer
https://kackdelar.top/
Signatures
-
Buer Loader 3 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral2/memory/3372-14-0x0000000040000000-0x000000004000C000-memory.dmp buer behavioral2/memory/3372-15-0x0000000040002E38-mapping.dmp buer behavioral2/memory/3372-16-0x0000000040000000-0x000000004000C000-memory.dmp buer -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe File opened (read-only) \??\U: 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe File opened (read-only) \??\X: 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe File opened (read-only) \??\P: 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe File opened (read-only) \??\S: 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe File opened (read-only) \??\E: 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe File opened (read-only) \??\F: 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe File opened (read-only) \??\G: 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe File opened (read-only) \??\I: 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe File opened (read-only) \??\M: 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe File opened (read-only) \??\O: 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe File opened (read-only) \??\V: 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe File opened (read-only) \??\H: 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe File opened (read-only) \??\Z: 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe File opened (read-only) \??\R: 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe File opened (read-only) \??\T: 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe File opened (read-only) \??\A: 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe File opened (read-only) \??\B: 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe File opened (read-only) \??\J: 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe File opened (read-only) \??\K: 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe File opened (read-only) \??\N: 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe File opened (read-only) \??\Q: 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe File opened (read-only) \??\W: 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe File opened (read-only) \??\Y: 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3816 set thread context of 3372 3816 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe 77 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3980 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3816 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe 3816 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe 3816 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe 408 powershell.exe 408 powershell.exe 408 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3816 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe Token: SeDebugPrivilege 408 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3816 wrote to memory of 3980 3816 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe 75 PID 3816 wrote to memory of 3980 3816 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe 75 PID 3816 wrote to memory of 3980 3816 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe 75 PID 3816 wrote to memory of 3372 3816 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe 77 PID 3816 wrote to memory of 3372 3816 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe 77 PID 3816 wrote to memory of 3372 3816 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe 77 PID 3816 wrote to memory of 3372 3816 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe 77 PID 3816 wrote to memory of 3372 3816 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe 77 PID 3816 wrote to memory of 3372 3816 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe 77 PID 3816 wrote to memory of 3372 3816 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe 77 PID 3816 wrote to memory of 3372 3816 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe 77 PID 3816 wrote to memory of 3372 3816 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe 77 PID 3372 wrote to memory of 408 3372 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe 78 PID 3372 wrote to memory of 408 3372 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe 78 PID 3372 wrote to memory of 408 3372 17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe"C:\Users\Admin\AppData\Local\Temp\17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KUCeBegeqW" /XML "C:\Users\Admin\AppData\Local\Temp\tmp11D3.tmp"2⤵
- Creates scheduled task(s)
PID:3980
-
-
C:\Users\Admin\AppData\Local\Temp\17147bfbf7936c807449340f3cbcaf49f16e905d8f768b16f8c2e628bf49a894.exe"{path}"2⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "& {Add-MpPreference -ExclusionPath C:\ProgramData\8368fc09951cc8b0734c}"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:408
-
-