Analysis
-
max time kernel
16s -
max time network
110s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
15-12-2020 17:05
Static task
static1
Behavioral task
behavioral1
Sample
servises.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
servises.exe
-
Size
84KB
-
MD5
a61dd95d2cc4906965584bb254dcabfb
-
SHA1
e0fb69709c4d5b98f53d4f146c706529f3a9a4fe
-
SHA256
110832d77e7e042955d0bee350f739c3348b3c67ca6f690f02a487d28aefaff4
-
SHA512
92cd8dda86441c98c1ad8891d2a63feea50f5bae4a7c5d82f152780b2bf84c78da222fbed9f6b62deba015e9b63fe6962a76f92b9fab61c19cfb2f7890de183b
Malware Config
Extracted
Family
buer
C2
softwareconsbank.com
Signatures
-
Buer Loader 3 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral2/memory/1636-3-0x0000000040000000-0x0000000040009000-memory.dmp buer behavioral2/memory/1636-4-0x0000000040005DA8-mapping.dmp buer behavioral2/memory/1636-5-0x0000000040000000-0x0000000040009000-memory.dmp buer -
Loads dropped DLL 1 IoCs
pid Process 1052 servises.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1052 set thread context of 1636 1052 servises.exe 79 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1052 servises.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1052 wrote to memory of 1636 1052 servises.exe 79 PID 1052 wrote to memory of 1636 1052 servises.exe 79 PID 1052 wrote to memory of 1636 1052 servises.exe 79 PID 1052 wrote to memory of 1636 1052 servises.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\servises.exe"C:\Users\Admin\AppData\Local\Temp\servises.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\servises.exe"C:\Users\Admin\AppData\Local\Temp\servises.exe"2⤵PID:1636
-