Analysis
-
max time kernel
90s -
max time network
92s -
platform
windows10_x64 -
resource
win10 -
submitted
22-09-2020 17:33
Static task
static1
Behavioral task
behavioral1
Sample
Document.exe
Resource
win7v200722
windows7_x64
0 signatures
0 seconds
General
-
Target
Document.exe
-
Size
239KB
-
MD5
f447d7a2f7cfb24db6b3c42716b16457
-
SHA1
6c898d8bc1b2311859b34df36e0ba9c392a30b9f
-
SHA256
67c08d2a21a3ade47ed790aa65ef7cbb117e32300b432f5be97d5ff13c745247
-
SHA512
b303f0d106ce5fadda89346e78516ca8251dd532f1efa2540085b665d9de6dbba03c77bdc7007294a893f62a5e1fe22790513b97261eb6ba4eed1aac4d870e1a
Malware Config
Extracted
Family
buer
C2
https://104.248.83.13/
Signatures
-
Buer Loader 2 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral2/memory/3068-0-0x0000000000660000-0x000000000066F000-memory.dmp buer behavioral2/memory/3068-1-0x0000000040000000-0x000000004000C000-memory.dmp buer -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: Document.exe File opened (read-only) \??\F: Document.exe File opened (read-only) \??\H: Document.exe File opened (read-only) \??\Q: Document.exe File opened (read-only) \??\T: Document.exe File opened (read-only) \??\U: Document.exe File opened (read-only) \??\W: Document.exe File opened (read-only) \??\Z: Document.exe File opened (read-only) \??\I: Document.exe File opened (read-only) \??\K: Document.exe File opened (read-only) \??\M: Document.exe File opened (read-only) \??\N: Document.exe File opened (read-only) \??\S: Document.exe File opened (read-only) \??\P: Document.exe File opened (read-only) \??\V: Document.exe File opened (read-only) \??\Y: Document.exe File opened (read-only) \??\A: Document.exe File opened (read-only) \??\B: Document.exe File opened (read-only) \??\E: Document.exe File opened (read-only) \??\G: Document.exe File opened (read-only) \??\L: Document.exe File opened (read-only) \??\J: Document.exe File opened (read-only) \??\O: Document.exe File opened (read-only) \??\R: Document.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1508 powershell.exe 1508 powershell.exe 1508 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1508 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3068 wrote to memory of 1508 3068 Document.exe 76 PID 3068 wrote to memory of 1508 3068 Document.exe 76 PID 3068 wrote to memory of 1508 3068 Document.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\Document.exe"C:\Users\Admin\AppData\Local\Temp\Document.exe"1⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "& {Add-MpPreference -ExclusionPath C:\ProgramData\d082df836616ecbce5f8}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1508
-