Analysis
-
max time kernel
600s -
max time network
601s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
08-02-2021 07:39
Static task
static1
Behavioral task
behavioral1
Sample
eci7g.bin.exe
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
eci7g.bin.exe
Malware Config
Extracted
Family
buer
C2
officewestunionbank.com
bankcreditsign.com
Extracted
Family
raccoon
Botnet
fbb3ff62285b6085836cfe3d032d817936c927a9
Attributes
-
url4cnc
https://telete.in/jvadikkamushkin
rc4.plain
rc4.plain
Signatures
-
Buer Loader 2 IoCs
Detects Buer loader in memory or disk.
Processes:
resource yara_rule behavioral1/memory/508-3-0x0000000000030000-0x0000000000037000-memory.dmp buer behavioral1/memory/508-4-0x0000000040000000-0x0000000040009000-memory.dmp buer -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
eci7g.bin.exedescription ioc process File opened (read-only) \??\Y: eci7g.bin.exe File opened (read-only) \??\B: eci7g.bin.exe File opened (read-only) \??\Q: eci7g.bin.exe File opened (read-only) \??\R: eci7g.bin.exe File opened (read-only) \??\T: eci7g.bin.exe File opened (read-only) \??\L: eci7g.bin.exe File opened (read-only) \??\O: eci7g.bin.exe File opened (read-only) \??\P: eci7g.bin.exe File opened (read-only) \??\U: eci7g.bin.exe File opened (read-only) \??\W: eci7g.bin.exe File opened (read-only) \??\A: eci7g.bin.exe File opened (read-only) \??\I: eci7g.bin.exe File opened (read-only) \??\G: eci7g.bin.exe File opened (read-only) \??\H: eci7g.bin.exe File opened (read-only) \??\J: eci7g.bin.exe File opened (read-only) \??\K: eci7g.bin.exe File opened (read-only) \??\M: eci7g.bin.exe File opened (read-only) \??\N: eci7g.bin.exe File opened (read-only) \??\E: eci7g.bin.exe File opened (read-only) \??\F: eci7g.bin.exe File opened (read-only) \??\X: eci7g.bin.exe File opened (read-only) \??\Z: eci7g.bin.exe File opened (read-only) \??\S: eci7g.bin.exe File opened (read-only) \??\V: eci7g.bin.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
eci7g.bin.exedescription pid process target process PID 508 set thread context of 192 508 eci7g.bin.exe svchost.exe PID 508 set thread context of 1280 508 eci7g.bin.exe svchost.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
eci7g.bin.exedescription pid process target process PID 508 wrote to memory of 192 508 eci7g.bin.exe svchost.exe PID 508 wrote to memory of 192 508 eci7g.bin.exe svchost.exe PID 508 wrote to memory of 192 508 eci7g.bin.exe svchost.exe PID 508 wrote to memory of 192 508 eci7g.bin.exe svchost.exe PID 508 wrote to memory of 192 508 eci7g.bin.exe svchost.exe PID 508 wrote to memory of 192 508 eci7g.bin.exe svchost.exe PID 508 wrote to memory of 192 508 eci7g.bin.exe svchost.exe PID 508 wrote to memory of 192 508 eci7g.bin.exe svchost.exe PID 508 wrote to memory of 192 508 eci7g.bin.exe svchost.exe PID 508 wrote to memory of 1280 508 eci7g.bin.exe svchost.exe PID 508 wrote to memory of 1280 508 eci7g.bin.exe svchost.exe PID 508 wrote to memory of 1280 508 eci7g.bin.exe svchost.exe PID 508 wrote to memory of 1280 508 eci7g.bin.exe svchost.exe PID 508 wrote to memory of 1280 508 eci7g.bin.exe svchost.exe PID 508 wrote to memory of 1280 508 eci7g.bin.exe svchost.exe PID 508 wrote to memory of 1280 508 eci7g.bin.exe svchost.exe PID 508 wrote to memory of 1280 508 eci7g.bin.exe svchost.exe PID 508 wrote to memory of 1280 508 eci7g.bin.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eci7g.bin.exe"C:\Users\Admin\AppData\Local\Temp\eci7g.bin.exe"1⤵
- Enumerates connected drives
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"2⤵
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/192-5-0x0000000000400000-0x0000000000494000-memory.dmpFilesize
592KB
-
memory/192-6-0x000000000043FEA3-mapping.dmp
-
memory/192-7-0x0000000000400000-0x0000000000494000-memory.dmpFilesize
592KB
-
memory/508-2-0x00000000006C0000-0x00000000006C1000-memory.dmpFilesize
4KB
-
memory/508-3-0x0000000000030000-0x0000000000037000-memory.dmpFilesize
28KB
-
memory/508-4-0x0000000040000000-0x0000000040009000-memory.dmpFilesize
36KB
-
memory/1280-9-0x000000000043FEA3-mapping.dmp
-
memory/1280-10-0x0000000000400000-0x0000000000494000-memory.dmpFilesize
592KB