Analysis
-
max time kernel
134s -
max time network
137s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
16-12-2020 08:32
Static task
static1
Behavioral task
behavioral1
Sample
64196c73fde1578c805cd9175aab70e5.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
64196c73fde1578c805cd9175aab70e5.exe
-
Size
86KB
-
MD5
64196c73fde1578c805cd9175aab70e5
-
SHA1
6b109f1c3844b081edc36ddb65c3a379609a9db9
-
SHA256
b0a639215a6ea4dc14ffc7fbc6f3c102605d17008a51de477cb755e35794a8c0
-
SHA512
b752a8cf758540e2bce1bda7799acc4c3d47f9f08f533c70ef924141d1ebf3e18a1bc61afa744e87fd690f990d2d54a30d22c7e70f47c14c43c084d86f6250d1
Malware Config
Extracted
Family
buer
C2
softwareconsbank.com
Signatures
-
Buer Loader 3 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral2/memory/3180-3-0x0000000040000000-0x0000000040009000-memory.dmp buer behavioral2/memory/3180-4-0x0000000040005DA8-mapping.dmp buer behavioral2/memory/3180-5-0x0000000040000000-0x0000000040009000-memory.dmp buer -
Loads dropped DLL 1 IoCs
pid Process 4692 64196c73fde1578c805cd9175aab70e5.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4692 set thread context of 3180 4692 64196c73fde1578c805cd9175aab70e5.exe 77 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4692 64196c73fde1578c805cd9175aab70e5.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4692 wrote to memory of 3180 4692 64196c73fde1578c805cd9175aab70e5.exe 77 PID 4692 wrote to memory of 3180 4692 64196c73fde1578c805cd9175aab70e5.exe 77 PID 4692 wrote to memory of 3180 4692 64196c73fde1578c805cd9175aab70e5.exe 77 PID 4692 wrote to memory of 3180 4692 64196c73fde1578c805cd9175aab70e5.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\64196c73fde1578c805cd9175aab70e5.exe"C:\Users\Admin\AppData\Local\Temp\64196c73fde1578c805cd9175aab70e5.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\64196c73fde1578c805cd9175aab70e5.exe"C:\Users\Admin\AppData\Local\Temp\64196c73fde1578c805cd9175aab70e5.exe"2⤵PID:3180
-