Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    14s
  • max time network
    9s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    15/12/2020, 18:01 UTC

General

  • Target

    110832d77e7e042955d0bee350f739c3348b3c67ca6f690f02a487d28aefaff4.exe_.exe

  • Size

    84KB

  • MD5

    a61dd95d2cc4906965584bb254dcabfb

  • SHA1

    e0fb69709c4d5b98f53d4f146c706529f3a9a4fe

  • SHA256

    110832d77e7e042955d0bee350f739c3348b3c67ca6f690f02a487d28aefaff4

  • SHA512

    92cd8dda86441c98c1ad8891d2a63feea50f5bae4a7c5d82f152780b2bf84c78da222fbed9f6b62deba015e9b63fe6962a76f92b9fab61c19cfb2f7890de183b

Score
10/10

Malware Config

Extracted

Family

buer

C2

softwareconsbank.com

Signatures

  • Buer

    Buer is a new modular loader first seen in August 2019.

  • Buer Loader 3 IoCs

    Detects Buer loader in memory or disk.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\110832d77e7e042955d0bee350f739c3348b3c67ca6f690f02a487d28aefaff4.exe_.exe
    "C:\Users\Admin\AppData\Local\Temp\110832d77e7e042955d0bee350f739c3348b3c67ca6f690f02a487d28aefaff4.exe_.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Users\Admin\AppData\Local\Temp\110832d77e7e042955d0bee350f739c3348b3c67ca6f690f02a487d28aefaff4.exe_.exe
      "C:\Users\Admin\AppData\Local\Temp\110832d77e7e042955d0bee350f739c3348b3c67ca6f690f02a487d28aefaff4.exe_.exe"
      2⤵
        PID:1392

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1392-3-0x0000000040000000-0x0000000040009000-memory.dmp

      Filesize

      36KB

    • memory/1392-5-0x0000000040000000-0x0000000040009000-memory.dmp

      Filesize

      36KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.