Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
04-02-2021 02:56
Static task
static1
Behavioral task
behavioral1
Sample
ST33MQz3ZZ47fFjr8g09.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
ST33MQz3ZZ47fFjr8g09.exe
-
Size
123KB
-
MD5
0ca7982165af34d00aa28aa8a0564c5e
-
SHA1
b2aab201e5fda813600514f81f5224d267fcdbb8
-
SHA256
7f43651edf5d5bb92a5c6c66042d068d2d4e27cb9a6e45d46e03ca7cbfe4f39f
-
SHA512
ef4c6584a0b3fa255e28e217fc5243c71268eea1883c42b7b228cdaa64f928bf2af093663ce04bc18e75d893912f048d9fae892437904c7e78ed5d8367a9717d
Malware Config
Extracted
Family
buer
C2
officewestbankingconc.com
Signatures
-
Buer Loader 1 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral1/memory/1484-5-0x0000000040000000-0x000000004000A000-memory.dmp buer -
Loads dropped DLL 1 IoCs
pid Process 1728 ST33MQz3ZZ47fFjr8g09.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1728 set thread context of 1484 1728 ST33MQz3ZZ47fFjr8g09.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1728 ST33MQz3ZZ47fFjr8g09.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1728 wrote to memory of 1484 1728 ST33MQz3ZZ47fFjr8g09.exe 29 PID 1728 wrote to memory of 1484 1728 ST33MQz3ZZ47fFjr8g09.exe 29 PID 1728 wrote to memory of 1484 1728 ST33MQz3ZZ47fFjr8g09.exe 29 PID 1728 wrote to memory of 1484 1728 ST33MQz3ZZ47fFjr8g09.exe 29 PID 1728 wrote to memory of 1484 1728 ST33MQz3ZZ47fFjr8g09.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ST33MQz3ZZ47fFjr8g09.exe"C:\Users\Admin\AppData\Local\Temp\ST33MQz3ZZ47fFjr8g09.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\ST33MQz3ZZ47fFjr8g09.exe"C:\Users\Admin\AppData\Local\Temp\ST33MQz3ZZ47fFjr8g09.exe"2⤵PID:1484
-