Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    09-11-2020 12:43

General

  • Target

    85da0e15d51bbb0ff7efe69d6cf0e1858efaa0ba1993222868ee71d3d755e124.exe

  • Size

    35KB

  • MD5

    6f14c56f141d8eb8ccc58f6e3f341426

  • SHA1

    70d9bc4ded0b7546ad7ee6d4873a5f5f58bc04e7

  • SHA256

    85da0e15d51bbb0ff7efe69d6cf0e1858efaa0ba1993222868ee71d3d755e124

  • SHA512

    c91fb3355543beb3040ee4ef1287f1725f834279cc58786fe37fe0859612198b69e971c9910d379254018b51d0058749ae6199e28aec15d9ef5ce76fd3bbe5bd

Score
10/10

Malware Config

Extracted

Family

buer

C2

https://gstatiknetiplist.cc/

https://gstatiknetiplist.com/

Signatures

  • Buer

    Buer is a new modular loader first seen in August 2019.

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Buer Loader 5 IoCs

    Detects Buer loader in memory or disk.

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\85da0e15d51bbb0ff7efe69d6cf0e1858efaa0ba1993222868ee71d3d755e124.exe
    "C:\Users\Admin\AppData\Local\Temp\85da0e15d51bbb0ff7efe69d6cf0e1858efaa0ba1993222868ee71d3d755e124.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\ProgramData\ErrorResponder\responder.exe
      C:\ProgramData\ErrorResponder\responder.exe "C:\Users\Admin\AppData\Local\Temp\85da0e15d51bbb0ff7efe69d6cf0e1858efaa0ba1993222868ee71d3d755e124.exe" ensgJJ
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1696
      • C:\Windows\SysWOW64\secinit.exe
        C:\ProgramData\ErrorResponder\responder.exe
        3⤵
        • Modifies WinLogon for persistence
        • Enumerates connected drives
        • Suspicious behavior: EnumeratesProcesses
        PID:1436

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1436-5-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB