Analysis

  • max time kernel
    140s
  • max time network
    155s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    10-11-2020 07:16

General

  • Target

    f999edd74944952bddbe025dcb0245ede599cee22c7fadd61b748eabfec44247.exe

  • Size

    35KB

  • MD5

    765274ee8121b9bfef342fb1e253de46

  • SHA1

    2ed894e1cc06b262193933bd1adccdfa9e96c3ee

  • SHA256

    f999edd74944952bddbe025dcb0245ede599cee22c7fadd61b748eabfec44247

  • SHA512

    7dafb97890c32605a7455c2ae32d50f24c3163ab85e77f2cabeef4f301fd52d46b1cd5286e0f886a6e8cfb1a8087aef1f9919c3b0fc8813563756b79e7d81f28

Score
10/10

Malware Config

Extracted

Family

buer

C2

https://maldivosgrant.net/

https://jokenoiam.net/

Signatures

  • Buer

    Buer is a new modular loader first seen in August 2019.

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Buer Loader 3 IoCs

    Detects Buer loader in memory or disk.

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f999edd74944952bddbe025dcb0245ede599cee22c7fadd61b748eabfec44247.exe
    "C:\Users\Admin\AppData\Local\Temp\f999edd74944952bddbe025dcb0245ede599cee22c7fadd61b748eabfec44247.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4712
    • C:\ProgramData\RedTools\networker.exe
      C:\ProgramData\RedTools\networker.exe "C:\Users\Admin\AppData\Local\Temp\f999edd74944952bddbe025dcb0245ede599cee22c7fadd61b748eabfec44247.exe" ensgJJ
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:3196
      • C:\Windows\SysWOW64\secinit.exe
        C:\ProgramData\RedTools\networker.exe
        3⤵
        • Modifies WinLogon for persistence
        • Enumerates connected drives
        • Suspicious behavior: EnumeratesProcesses
        PID:2668

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2668-3-0x0000000002B40000-0x0000000002B41000-memory.dmp

    Filesize

    4KB