Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
30-11-2020 21:44
Static task
static1
Behavioral task
behavioral1
Sample
web.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
web.exe
-
Size
95KB
-
MD5
bf613fe70f790d4b932601daa60a8797
-
SHA1
b53db9020c6115cea9e36dc9764bd45e5d9cfd6c
-
SHA256
1c8260f2d597cfc1922ca72162e1eb3f8272c2d18fa41d77b145d32256c0063d
-
SHA512
ce53eab5bd74fc2c70cf01d44597e63f50d27d2baaaf25cb166ab0f2c83add4773d936bbbebdfe03b30cd0a677b6b269abf8c8af02b3597c055a149e416db286
Malware Config
Extracted
Family
buer
C2
basiliskbank.com
Signatures
-
Buer Loader 3 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral1/memory/1252-3-0x0000000040000000-0x0000000040009000-memory.dmp buer behavioral1/memory/1252-4-0x0000000040005DA8-mapping.dmp buer behavioral1/memory/1252-5-0x0000000040000000-0x0000000040009000-memory.dmp buer -
Loads dropped DLL 1 IoCs
pid Process 756 web.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 756 set thread context of 1252 756 web.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 756 web.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 756 wrote to memory of 1252 756 web.exe 29 PID 756 wrote to memory of 1252 756 web.exe 29 PID 756 wrote to memory of 1252 756 web.exe 29 PID 756 wrote to memory of 1252 756 web.exe 29 PID 756 wrote to memory of 1252 756 web.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\web.exe"C:\Users\Admin\AppData\Local\Temp\web.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Users\Admin\AppData\Local\Temp\web.exe"C:\Users\Admin\AppData\Local\Temp\web.exe"2⤵PID:1252
-