Analysis
-
max time kernel
134s -
max time network
15s -
platform
windows7_x64 -
resource
win7v200722 -
submitted
22-09-2020 17:33
Static task
static1
Behavioral task
behavioral1
Sample
Document.exe
Resource
win7v200722
windows7_x64
0 signatures
0 seconds
General
-
Target
Document.exe
-
Size
239KB
-
MD5
f447d7a2f7cfb24db6b3c42716b16457
-
SHA1
6c898d8bc1b2311859b34df36e0ba9c392a30b9f
-
SHA256
67c08d2a21a3ade47ed790aa65ef7cbb117e32300b432f5be97d5ff13c745247
-
SHA512
b303f0d106ce5fadda89346e78516ca8251dd532f1efa2540085b665d9de6dbba03c77bdc7007294a893f62a5e1fe22790513b97261eb6ba4eed1aac4d870e1a
Malware Config
Extracted
Family
buer
C2
https://104.248.83.13/
Signatures
-
Buer Loader 2 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral1/memory/1452-0-0x0000000000250000-0x000000000025F000-memory.dmp buer behavioral1/memory/1452-1-0x0000000040000000-0x000000004000C000-memory.dmp buer -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: Document.exe File opened (read-only) \??\L: Document.exe File opened (read-only) \??\N: Document.exe File opened (read-only) \??\O: Document.exe File opened (read-only) \??\P: Document.exe File opened (read-only) \??\R: Document.exe File opened (read-only) \??\A: Document.exe File opened (read-only) \??\Q: Document.exe File opened (read-only) \??\T: Document.exe File opened (read-only) \??\Z: Document.exe File opened (read-only) \??\J: Document.exe File opened (read-only) \??\I: Document.exe File opened (read-only) \??\M: Document.exe File opened (read-only) \??\W: Document.exe File opened (read-only) \??\X: Document.exe File opened (read-only) \??\B: Document.exe File opened (read-only) \??\F: Document.exe File opened (read-only) \??\G: Document.exe File opened (read-only) \??\K: Document.exe File opened (read-only) \??\S: Document.exe File opened (read-only) \??\U: Document.exe File opened (read-only) \??\V: Document.exe File opened (read-only) \??\Y: Document.exe File opened (read-only) \??\E: Document.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1932 powershell.exe 1932 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1932 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1452 wrote to memory of 1932 1452 Document.exe 28 PID 1452 wrote to memory of 1932 1452 Document.exe 28 PID 1452 wrote to memory of 1932 1452 Document.exe 28 PID 1452 wrote to memory of 1932 1452 Document.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Document.exe"C:\Users\Admin\AppData\Local\Temp\Document.exe"1⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "& {Add-MpPreference -ExclusionPath C:\ProgramData\86395f8778bc91dda2f8}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1932
-