Analysis
-
max time kernel
132s -
max time network
137s -
platform
windows7_x64 -
resource
win7 -
submitted
22-09-2020 21:41
Static task
static1
Behavioral task
behavioral1
Sample
Review.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
General
-
Target
Review.exe
-
Size
239KB
-
MD5
fa0322fb70610d6e67585588184eda39
-
SHA1
7bf793587550abbc8a39d5cb26b1328483b17820
-
SHA256
3d994a2f80a63f31bf56ddded5ed35f020c40c0324b3ab1935e08b15c25ba017
-
SHA512
6615bd7060022ab8e6e36160955f1e09d6800dbe509b85aafb738f890c54c1568cbbfbd77451a55bdefc42dd2c1ad899d78ef4022a8cdcfadcd2d1b3f0baa56b
Malware Config
Extracted
Family
buer
C2
https://104.248.83.13/
Signatures
-
Buer Loader 2 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral1/memory/900-0-0x0000000000250000-0x000000000025F000-memory.dmp buer behavioral1/memory/900-1-0x0000000040000000-0x000000004000C000-memory.dmp buer -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1956 powershell.exe 1956 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1956 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 900 wrote to memory of 1956 900 Review.exe 28 PID 900 wrote to memory of 1956 900 Review.exe 28 PID 900 wrote to memory of 1956 900 Review.exe 28 PID 900 wrote to memory of 1956 900 Review.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Review.exe"C:\Users\Admin\AppData\Local\Temp\Review.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "& {Add-MpPreference -ExclusionPath C:\ProgramData\3f7c9518ab7ea32648c7}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1956
-