Analysis
-
max time kernel
1716s -
max time network
1592s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
18-12-2020 09:25
Static task
static1
Behavioral task
behavioral1
Sample
3f28f4aebf8fa5fc27f5e3b72dac993f.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
3f28f4aebf8fa5fc27f5e3b72dac993f.exe
-
Size
83KB
-
MD5
3f28f4aebf8fa5fc27f5e3b72dac993f
-
SHA1
9c03a13ec3c2baa597ae1c759baea9d57ace4599
-
SHA256
146bcd0d720f43d289c66d3a3cdc77e5e5a3d924174ee1993ac6db2cb0ca8026
-
SHA512
13c7007f3918350be0f201ebca153f6967302ac1136ea9cd08b8f6d6b12772c8fc1dab05a1458db059db197fd5b04875e315064b6029dc68d558074a7648b595
Malware Config
Extracted
Family
buer
C2
softwareconsbank.com
Signatures
-
Buer Loader 3 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral1/memory/1752-3-0x0000000040000000-0x0000000040009000-memory.dmp buer behavioral1/memory/1752-4-0x0000000040005DA8-mapping.dmp buer behavioral1/memory/1752-5-0x0000000040000000-0x0000000040009000-memory.dmp buer -
Loads dropped DLL 1 IoCs
pid Process 1208 3f28f4aebf8fa5fc27f5e3b72dac993f.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: 3f28f4aebf8fa5fc27f5e3b72dac993f.exe File opened (read-only) \??\K: 3f28f4aebf8fa5fc27f5e3b72dac993f.exe File opened (read-only) \??\L: 3f28f4aebf8fa5fc27f5e3b72dac993f.exe File opened (read-only) \??\P: 3f28f4aebf8fa5fc27f5e3b72dac993f.exe File opened (read-only) \??\U: 3f28f4aebf8fa5fc27f5e3b72dac993f.exe File opened (read-only) \??\R: 3f28f4aebf8fa5fc27f5e3b72dac993f.exe File opened (read-only) \??\T: 3f28f4aebf8fa5fc27f5e3b72dac993f.exe File opened (read-only) \??\Z: 3f28f4aebf8fa5fc27f5e3b72dac993f.exe File opened (read-only) \??\W: 3f28f4aebf8fa5fc27f5e3b72dac993f.exe File opened (read-only) \??\E: 3f28f4aebf8fa5fc27f5e3b72dac993f.exe File opened (read-only) \??\H: 3f28f4aebf8fa5fc27f5e3b72dac993f.exe File opened (read-only) \??\I: 3f28f4aebf8fa5fc27f5e3b72dac993f.exe File opened (read-only) \??\J: 3f28f4aebf8fa5fc27f5e3b72dac993f.exe File opened (read-only) \??\V: 3f28f4aebf8fa5fc27f5e3b72dac993f.exe File opened (read-only) \??\O: 3f28f4aebf8fa5fc27f5e3b72dac993f.exe File opened (read-only) \??\Q: 3f28f4aebf8fa5fc27f5e3b72dac993f.exe File opened (read-only) \??\S: 3f28f4aebf8fa5fc27f5e3b72dac993f.exe File opened (read-only) \??\B: 3f28f4aebf8fa5fc27f5e3b72dac993f.exe File opened (read-only) \??\F: 3f28f4aebf8fa5fc27f5e3b72dac993f.exe File opened (read-only) \??\G: 3f28f4aebf8fa5fc27f5e3b72dac993f.exe File opened (read-only) \??\M: 3f28f4aebf8fa5fc27f5e3b72dac993f.exe File opened (read-only) \??\N: 3f28f4aebf8fa5fc27f5e3b72dac993f.exe File opened (read-only) \??\X: 3f28f4aebf8fa5fc27f5e3b72dac993f.exe File opened (read-only) \??\Y: 3f28f4aebf8fa5fc27f5e3b72dac993f.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1208 set thread context of 1752 1208 3f28f4aebf8fa5fc27f5e3b72dac993f.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1208 3f28f4aebf8fa5fc27f5e3b72dac993f.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1208 wrote to memory of 1752 1208 3f28f4aebf8fa5fc27f5e3b72dac993f.exe 29 PID 1208 wrote to memory of 1752 1208 3f28f4aebf8fa5fc27f5e3b72dac993f.exe 29 PID 1208 wrote to memory of 1752 1208 3f28f4aebf8fa5fc27f5e3b72dac993f.exe 29 PID 1208 wrote to memory of 1752 1208 3f28f4aebf8fa5fc27f5e3b72dac993f.exe 29 PID 1208 wrote to memory of 1752 1208 3f28f4aebf8fa5fc27f5e3b72dac993f.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f28f4aebf8fa5fc27f5e3b72dac993f.exe"C:\Users\Admin\AppData\Local\Temp\3f28f4aebf8fa5fc27f5e3b72dac993f.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\3f28f4aebf8fa5fc27f5e3b72dac993f.exe"C:\Users\Admin\AppData\Local\Temp\3f28f4aebf8fa5fc27f5e3b72dac993f.exe"2⤵
- Enumerates connected drives
PID:1752
-