Resubmissions
13-02-2021 05:16
210213-atnqs85c7a 1013-02-2021 00:12
210213-k9zhewha3j 1002-02-2021 12:35
210202-vg7em3tbxn 10Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
02-02-2021 12:35
Static task
static1
Behavioral task
behavioral1
Sample
d0b8e002997a8fed4ec8ec7996a4c7fabd360a7119d388c632d00ff1405269a6.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
d0b8e002997a8fed4ec8ec7996a4c7fabd360a7119d388c632d00ff1405269a6.exe
Resource
win10v20201028
General
-
Target
d0b8e002997a8fed4ec8ec7996a4c7fabd360a7119d388c632d00ff1405269a6.exe
-
Size
22KB
-
MD5
1c3fd3a47171b6312cb28d996da0a0d9
-
SHA1
7e53bcbf99a3d164431b0318fe4ccb8cfe7da40a
-
SHA256
d0b8e002997a8fed4ec8ec7996a4c7fabd360a7119d388c632d00ff1405269a6
-
SHA512
762c3d63fa49f972e4e37b0be9627575f24f9527960450f640835c06b72909a9237aac749adf6b77a52790f17358106887d6cb630a196727d00ef113daf05892
Malware Config
Extracted
buer
http://95.216.251.221:8080/
Signatures
-
Buer Loader 2 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral2/files/0x000100000001ab72-3.dat buer behavioral2/files/0x000100000001ab72-4.dat buer -
Executes dropped EXE 1 IoCs
pid Process 908 manager.exe -
Deletes itself 1 IoCs
pid Process 908 manager.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce manager.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ActiveX Component = "C:\\Users\\Admin\\AppData\\Roaming\\ActiveX\\manager.exe" manager.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1064 wrote to memory of 908 1064 d0b8e002997a8fed4ec8ec7996a4c7fabd360a7119d388c632d00ff1405269a6.exe 78 PID 1064 wrote to memory of 908 1064 d0b8e002997a8fed4ec8ec7996a4c7fabd360a7119d388c632d00ff1405269a6.exe 78 PID 1064 wrote to memory of 908 1064 d0b8e002997a8fed4ec8ec7996a4c7fabd360a7119d388c632d00ff1405269a6.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0b8e002997a8fed4ec8ec7996a4c7fabd360a7119d388c632d00ff1405269a6.exe"C:\Users\Admin\AppData\Local\Temp\d0b8e002997a8fed4ec8ec7996a4c7fabd360a7119d388c632d00ff1405269a6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Roaming\ActiveX\manager.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe "C:\Users\Admin\AppData\Local\Temp\d0b8e002997a8fed4ec8ec7996a4c7fabd360a7119d388c632d00ff1405269a6.exe" ensgJJ2⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
PID:908
-