Analysis
-
max time kernel
15s -
max time network
110s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
18-12-2020 09:29
Static task
static1
Behavioral task
behavioral1
Sample
taskhost.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
taskhost.exe
-
Size
83KB
-
MD5
3f28f4aebf8fa5fc27f5e3b72dac993f
-
SHA1
9c03a13ec3c2baa597ae1c759baea9d57ace4599
-
SHA256
146bcd0d720f43d289c66d3a3cdc77e5e5a3d924174ee1993ac6db2cb0ca8026
-
SHA512
13c7007f3918350be0f201ebca153f6967302ac1136ea9cd08b8f6d6b12772c8fc1dab05a1458db059db197fd5b04875e315064b6029dc68d558074a7648b595
Malware Config
Extracted
Family
buer
C2
softwareconsbank.com
Signatures
-
Buer Loader 3 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral2/memory/204-3-0x0000000040000000-0x0000000040009000-memory.dmp buer behavioral2/memory/204-4-0x0000000040005DA8-mapping.dmp buer behavioral2/memory/204-5-0x0000000040000000-0x0000000040009000-memory.dmp buer -
Loads dropped DLL 1 IoCs
pid Process 576 taskhost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 576 set thread context of 204 576 taskhost.exe 78 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 576 taskhost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 576 wrote to memory of 204 576 taskhost.exe 78 PID 576 wrote to memory of 204 576 taskhost.exe 78 PID 576 wrote to memory of 204 576 taskhost.exe 78 PID 576 wrote to memory of 204 576 taskhost.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\taskhost.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Users\Admin\AppData\Local\Temp\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\taskhost.exe"2⤵PID:204
-