Analysis
-
max time kernel
91s -
max time network
92s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
10-02-2021 20:48
Static task
static1
Behavioral task
behavioral1
Sample
SCD10093264.jpg.exe
Resource
win7v20201028
General
-
Target
SCD10093264.jpg.exe
-
Size
104KB
-
MD5
1fa27c5e084887e9e3a2e232d27e10e3
-
SHA1
a7c98a694753ed745e8618369d16e39c46cca1e7
-
SHA256
41a4ee153b3c61cc8ed50de571e5b8f884de1c8c07332b7b31f238360832988c
-
SHA512
81ecb5e4b3ea478f27509d1eafd106ec224fc0ccdfd411cb3b2345fc752d738f6300fd575a2941611e1763dce125364fb765a48835249cd7e7e33e28a01f40b5
Malware Config
Extracted
buer
dtermalherbhos.com
Signatures
-
Buer Loader 1 IoCs
Detects Buer loader in memory or disk.
Processes:
resource yara_rule behavioral1/memory/1724-5-0x0000000040000000-0x000000004000A000-memory.dmp buer -
Loads dropped DLL 1 IoCs
Processes:
SCD10093264.jpg.exepid process 2008 SCD10093264.jpg.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SCD10093264.jpg.exedescription pid process target process PID 2008 set thread context of 1724 2008 SCD10093264.jpg.exe SCD10093264.jpg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
SCD10093264.jpg.exepid process 2008 SCD10093264.jpg.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
SCD10093264.jpg.exedescription pid process target process PID 2008 wrote to memory of 1724 2008 SCD10093264.jpg.exe SCD10093264.jpg.exe PID 2008 wrote to memory of 1724 2008 SCD10093264.jpg.exe SCD10093264.jpg.exe PID 2008 wrote to memory of 1724 2008 SCD10093264.jpg.exe SCD10093264.jpg.exe PID 2008 wrote to memory of 1724 2008 SCD10093264.jpg.exe SCD10093264.jpg.exe PID 2008 wrote to memory of 1724 2008 SCD10093264.jpg.exe SCD10093264.jpg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SCD10093264.jpg.exe"C:\Users\Admin\AppData\Local\Temp\SCD10093264.jpg.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\SCD10093264.jpg.exe"C:\Users\Admin\AppData\Local\Temp\SCD10093264.jpg.exe"2⤵PID:1724
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
fccff8cb7a1067e23fd2e2b63971a8e1
SHA130e2a9e137c1223a78a0f7b0bf96a1c361976d91
SHA2566fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
SHA512f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c