Analysis
-
max time kernel
61s -
max time network
122s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
30-11-2020 21:44
Static task
static1
Behavioral task
behavioral1
Sample
web.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
web.exe
-
Size
95KB
-
MD5
bf613fe70f790d4b932601daa60a8797
-
SHA1
b53db9020c6115cea9e36dc9764bd45e5d9cfd6c
-
SHA256
1c8260f2d597cfc1922ca72162e1eb3f8272c2d18fa41d77b145d32256c0063d
-
SHA512
ce53eab5bd74fc2c70cf01d44597e63f50d27d2baaaf25cb166ab0f2c83add4773d936bbbebdfe03b30cd0a677b6b269abf8c8af02b3597c055a149e416db286
Malware Config
Extracted
Family
buer
C2
basiliskbank.com
Signatures
-
Buer Loader 3 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral2/memory/2016-3-0x0000000040000000-0x0000000040009000-memory.dmp buer behavioral2/memory/2016-4-0x0000000040005DA8-mapping.dmp buer behavioral2/memory/2016-5-0x0000000040000000-0x0000000040009000-memory.dmp buer -
Loads dropped DLL 1 IoCs
pid Process 4068 web.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4068 set thread context of 2016 4068 web.exe 79 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4068 web.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4068 wrote to memory of 2016 4068 web.exe 79 PID 4068 wrote to memory of 2016 4068 web.exe 79 PID 4068 wrote to memory of 2016 4068 web.exe 79 PID 4068 wrote to memory of 2016 4068 web.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\web.exe"C:\Users\Admin\AppData\Local\Temp\web.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\web.exe"C:\Users\Admin\AppData\Local\Temp\web.exe"2⤵PID:2016
-