Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    7s
  • max time network
    11s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    24/12/2020, 00:58 UTC

General

  • Target

    SecuriteInfo.com.BehavesLike.Win32.AdwareAdload.mc.10837.exe

  • Size

    80KB

  • MD5

    a20399351b23e0bf909677d85c1025cb

  • SHA1

    30e4e30528bf931f096093ea81822fb89f4d71dc

  • SHA256

    593cf2c6d3140a5bf6bb6378aeadbc15abfa17691250e6ef1804d40534fd8a2e

  • SHA512

    8087b12dad90c54d18e46987aa6ed25cb098097a605c907621bbcf6fa97569b25531b93f5a30f1aca530b8e214d9d5f90b223c1b2bfea3e5637d762c763c15bd

Score
10/10

Malware Config

Extracted

Family

buer

C2

selectorbasebanks.com

Signatures

  • Buer

    Buer is a new modular loader first seen in August 2019.

  • Buer Loader 3 IoCs

    Detects Buer loader in memory or disk.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.AdwareAdload.mc.10837.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.AdwareAdload.mc.10837.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1096
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.AdwareAdload.mc.10837.exe
      "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.AdwareAdload.mc.10837.exe"
      2⤵
        PID:1536

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1536-3-0x0000000040000000-0x0000000040009000-memory.dmp

      Filesize

      36KB

    • memory/1536-5-0x0000000040000000-0x0000000040009000-memory.dmp

      Filesize

      36KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.