Resubmissions

13-02-2021 05:16

210213-atnqs85c7a 10

13-02-2021 00:12

210213-k9zhewha3j 10

02-02-2021 12:35

210202-vg7em3tbxn 10

Analysis

  • max time kernel
    143s
  • max time network
    146s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    02-02-2021 12:35

General

  • Target

    d0b8e002997a8fed4ec8ec7996a4c7fabd360a7119d388c632d00ff1405269a6.exe

  • Size

    22KB

  • MD5

    1c3fd3a47171b6312cb28d996da0a0d9

  • SHA1

    7e53bcbf99a3d164431b0318fe4ccb8cfe7da40a

  • SHA256

    d0b8e002997a8fed4ec8ec7996a4c7fabd360a7119d388c632d00ff1405269a6

  • SHA512

    762c3d63fa49f972e4e37b0be9627575f24f9527960450f640835c06b72909a9237aac749adf6b77a52790f17358106887d6cb630a196727d00ef113daf05892

Score
10/10

Malware Config

Extracted

Family

buer

C2

http://95.216.251.221:8080/

Signatures

  • Buer

    Buer is a new modular loader first seen in August 2019.

  • Buer Loader 2 IoCs

    Detects Buer loader in memory or disk.

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d0b8e002997a8fed4ec8ec7996a4c7fabd360a7119d388c632d00ff1405269a6.exe
    "C:\Users\Admin\AppData\Local\Temp\d0b8e002997a8fed4ec8ec7996a4c7fabd360a7119d388c632d00ff1405269a6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1064
    • C:\Users\Admin\AppData\Roaming\ActiveX\manager.exe
      C:\Users\Admin\AppData\Roaming\ActiveX\manager.exe "C:\Users\Admin\AppData\Local\Temp\d0b8e002997a8fed4ec8ec7996a4c7fabd360a7119d388c632d00ff1405269a6.exe" ensgJJ
      2⤵
      • Executes dropped EXE
      • Deletes itself
      • Adds Run key to start application
      PID:908

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads