Analysis
-
max time kernel
131s -
max time network
125s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
10-11-2020 07:16
Static task
static1
Behavioral task
behavioral1
Sample
f999edd74944952bddbe025dcb0245ede599cee22c7fadd61b748eabfec44247.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
f999edd74944952bddbe025dcb0245ede599cee22c7fadd61b748eabfec44247.exe
Resource
win10v20201028
General
-
Target
f999edd74944952bddbe025dcb0245ede599cee22c7fadd61b748eabfec44247.exe
-
Size
35KB
-
MD5
765274ee8121b9bfef342fb1e253de46
-
SHA1
2ed894e1cc06b262193933bd1adccdfa9e96c3ee
-
SHA256
f999edd74944952bddbe025dcb0245ede599cee22c7fadd61b748eabfec44247
-
SHA512
7dafb97890c32605a7455c2ae32d50f24c3163ab85e77f2cabeef4f301fd52d46b1cd5286e0f886a6e8cfb1a8087aef1f9919c3b0fc8813563756b79e7d81f28
Malware Config
Extracted
buer
https://maldivosgrant.net/
https://jokenoiam.net/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\RedTools\\networker.exe\"" networker.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\RedTools\\networker.exe\"" secinit.exe -
Buer Loader 5 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral1/files/0x000d00000000560a-0.dat buer behavioral1/files/0x000d00000000560a-1.dat buer behavioral1/files/0x000d00000000560a-3.dat buer behavioral1/files/0x000d00000000560a-4.dat buer behavioral1/memory/1204-6-0x0000000000000000-mapping.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 1304 networker.exe -
Deletes itself 1 IoCs
pid Process 1304 networker.exe -
Loads dropped DLL 2 IoCs
pid Process 1764 f999edd74944952bddbe025dcb0245ede599cee22c7fadd61b748eabfec44247.exe 1764 f999edd74944952bddbe025dcb0245ede599cee22c7fadd61b748eabfec44247.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: secinit.exe File opened (read-only) \??\S: secinit.exe File opened (read-only) \??\V: secinit.exe File opened (read-only) \??\I: secinit.exe File opened (read-only) \??\L: secinit.exe File opened (read-only) \??\M: secinit.exe File opened (read-only) \??\P: secinit.exe File opened (read-only) \??\Q: secinit.exe File opened (read-only) \??\A: secinit.exe File opened (read-only) \??\B: secinit.exe File opened (read-only) \??\H: secinit.exe File opened (read-only) \??\T: secinit.exe File opened (read-only) \??\X: secinit.exe File opened (read-only) \??\U: secinit.exe File opened (read-only) \??\W: secinit.exe File opened (read-only) \??\Z: secinit.exe File opened (read-only) \??\G: secinit.exe File opened (read-only) \??\K: secinit.exe File opened (read-only) \??\N: secinit.exe File opened (read-only) \??\R: secinit.exe File opened (read-only) \??\Y: secinit.exe File opened (read-only) \??\E: secinit.exe File opened (read-only) \??\F: secinit.exe File opened (read-only) \??\J: secinit.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1204 secinit.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1764 wrote to memory of 1304 1764 f999edd74944952bddbe025dcb0245ede599cee22c7fadd61b748eabfec44247.exe 29 PID 1764 wrote to memory of 1304 1764 f999edd74944952bddbe025dcb0245ede599cee22c7fadd61b748eabfec44247.exe 29 PID 1764 wrote to memory of 1304 1764 f999edd74944952bddbe025dcb0245ede599cee22c7fadd61b748eabfec44247.exe 29 PID 1764 wrote to memory of 1304 1764 f999edd74944952bddbe025dcb0245ede599cee22c7fadd61b748eabfec44247.exe 29 PID 1304 wrote to memory of 1204 1304 networker.exe 30 PID 1304 wrote to memory of 1204 1304 networker.exe 30 PID 1304 wrote to memory of 1204 1304 networker.exe 30 PID 1304 wrote to memory of 1204 1304 networker.exe 30 PID 1304 wrote to memory of 1204 1304 networker.exe 30 PID 1304 wrote to memory of 1204 1304 networker.exe 30 PID 1304 wrote to memory of 1204 1304 networker.exe 30 PID 1304 wrote to memory of 1204 1304 networker.exe 30 PID 1304 wrote to memory of 1204 1304 networker.exe 30 PID 1304 wrote to memory of 1204 1304 networker.exe 30 PID 1304 wrote to memory of 1204 1304 networker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f999edd74944952bddbe025dcb0245ede599cee22c7fadd61b748eabfec44247.exe"C:\Users\Admin\AppData\Local\Temp\f999edd74944952bddbe025dcb0245ede599cee22c7fadd61b748eabfec44247.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\ProgramData\RedTools\networker.exeC:\ProgramData\RedTools\networker.exe "C:\Users\Admin\AppData\Local\Temp\f999edd74944952bddbe025dcb0245ede599cee22c7fadd61b748eabfec44247.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\RedTools\networker.exe3⤵
- Modifies WinLogon for persistence
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
PID:1204
-
-