Analysis

  • max time kernel
    61s
  • max time network
    14s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    03-10-2020 10:06

General

  • Target

    fdafeff.exe

  • Size

    362KB

  • MD5

    1be0b4215bf8abfa0bb8920fd7749dc4

  • SHA1

    d5ece5b643c473e4e06e2701d06b3fb8b4327331

  • SHA256

    cf91ba98b1c8faba7f89257452b72656f810063ba402a1d5e815a881ec43418f

  • SHA512

    274942f59b5c3458f8b68b3394cfab46f07370887ee374d216ce0e92c5c1ec1421d117cab685ade33360d98c9fbac88d5d1147c321568c3888e58a48f8777087

Score
10/10

Malware Config

Signatures

  • Buer

    Buer is a new modular loader first seen in August 2019.

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fdafeff.exe
    "C:\Users\Admin\AppData\Local\Temp\fdafeff.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious use of WriteProcessMemory
    PID:1088
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -Command "& {Add-MpPreference -ExclusionPath C:\ProgramData\6c3602ec8ffb8551c78e}"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:740

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/740-1-0x0000000073F10000-0x00000000745FE000-memory.dmp

    Filesize

    6.9MB

  • memory/740-2-0x0000000000FF0000-0x0000000000FF1000-memory.dmp

    Filesize

    4KB

  • memory/740-3-0x00000000048E0000-0x00000000048E1000-memory.dmp

    Filesize

    4KB

  • memory/740-4-0x0000000001160000-0x0000000001161000-memory.dmp

    Filesize

    4KB

  • memory/740-5-0x0000000004850000-0x0000000004851000-memory.dmp

    Filesize

    4KB

  • memory/740-8-0x00000000060B0000-0x00000000060B1000-memory.dmp

    Filesize

    4KB

  • memory/740-13-0x00000000060F0000-0x00000000060F1000-memory.dmp

    Filesize

    4KB

  • memory/740-14-0x0000000006180000-0x0000000006181000-memory.dmp

    Filesize

    4KB

  • memory/740-21-0x0000000006280000-0x0000000006281000-memory.dmp

    Filesize

    4KB

  • memory/740-22-0x0000000005650000-0x0000000005651000-memory.dmp

    Filesize

    4KB

  • memory/740-36-0x0000000006300000-0x0000000006301000-memory.dmp

    Filesize

    4KB

  • memory/740-37-0x0000000006310000-0x0000000006311000-memory.dmp

    Filesize

    4KB