Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
02-02-2021 15:29
Static task
static1
Behavioral task
behavioral1
Sample
windowsphoto.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
windowsphoto.exe
-
Size
83KB
-
MD5
f7fc343cbf86f08c7b529ab451677752
-
SHA1
1ef5d87b03502389362fa7a2aa3931b5e3e34353
-
SHA256
e81d26edffa4b4570584bd1cb36211587108dfbbfc24f303a2c3e261cc3c59c1
-
SHA512
c77f3ac253edd3f2bdd23593c098d5de2e4fdeae7f8dadb04a1da49a8d984b4a790a9a0e538eafad7e22075b9f6527cc387dc8c4920f15fcaa09c4048a1e0a37
Malware Config
Extracted
Family
buer
C2
tokacpebanking.com
Signatures
-
Buer Loader 1 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral1/memory/1480-5-0x0000000040000000-0x000000004000A000-memory.dmp buer -
Loads dropped DLL 1 IoCs
pid Process 528 windowsphoto.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 528 set thread context of 1480 528 windowsphoto.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 528 windowsphoto.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 528 wrote to memory of 1480 528 windowsphoto.exe 29 PID 528 wrote to memory of 1480 528 windowsphoto.exe 29 PID 528 wrote to memory of 1480 528 windowsphoto.exe 29 PID 528 wrote to memory of 1480 528 windowsphoto.exe 29 PID 528 wrote to memory of 1480 528 windowsphoto.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\windowsphoto.exe"C:\Users\Admin\AppData\Local\Temp\windowsphoto.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Users\Admin\AppData\Local\Temp\windowsphoto.exe"C:\Users\Admin\AppData\Local\Temp\windowsphoto.exe"2⤵PID:1480
-