Analysis
-
max time kernel
1121s -
max time network
1124s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
12-02-2021 16:10
Static task
static1
General
-
Target
SCD10093264.jpg.exe
-
Size
104KB
-
MD5
1fa27c5e084887e9e3a2e232d27e10e3
-
SHA1
a7c98a694753ed745e8618369d16e39c46cca1e7
-
SHA256
41a4ee153b3c61cc8ed50de571e5b8f884de1c8c07332b7b31f238360832988c
-
SHA512
81ecb5e4b3ea478f27509d1eafd106ec224fc0ccdfd411cb3b2345fc752d738f6300fd575a2941611e1763dce125364fb765a48835249cd7e7e33e28a01f40b5
Malware Config
Extracted
Family
buer
C2
dtermalherbhos.com
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 3844 created 2668 3844 WerFault.exe 77 -
Buer Loader 1 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral1/memory/2668-4-0x0000000040000000-0x000000004000A000-memory.dmp buer -
Loads dropped DLL 1 IoCs
pid Process 3920 SCD10093264.jpg.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: SCD10093264.jpg.exe File opened (read-only) \??\M: SCD10093264.jpg.exe File opened (read-only) \??\S: SCD10093264.jpg.exe File opened (read-only) \??\X: SCD10093264.jpg.exe File opened (read-only) \??\H: SCD10093264.jpg.exe File opened (read-only) \??\J: SCD10093264.jpg.exe File opened (read-only) \??\I: SCD10093264.jpg.exe File opened (read-only) \??\N: SCD10093264.jpg.exe File opened (read-only) \??\O: SCD10093264.jpg.exe File opened (read-only) \??\Y: SCD10093264.jpg.exe File opened (read-only) \??\A: SCD10093264.jpg.exe File opened (read-only) \??\B: SCD10093264.jpg.exe File opened (read-only) \??\G: SCD10093264.jpg.exe File opened (read-only) \??\K: SCD10093264.jpg.exe File opened (read-only) \??\R: SCD10093264.jpg.exe File opened (read-only) \??\V: SCD10093264.jpg.exe File opened (read-only) \??\Z: SCD10093264.jpg.exe File opened (read-only) \??\E: SCD10093264.jpg.exe File opened (read-only) \??\F: SCD10093264.jpg.exe File opened (read-only) \??\T: SCD10093264.jpg.exe File opened (read-only) \??\U: SCD10093264.jpg.exe File opened (read-only) \??\W: SCD10093264.jpg.exe File opened (read-only) \??\P: SCD10093264.jpg.exe File opened (read-only) \??\Q: SCD10093264.jpg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3920 set thread context of 2668 3920 SCD10093264.jpg.exe 77 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3844 2668 WerFault.exe 77 -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3844 WerFault.exe 3844 WerFault.exe 3844 WerFault.exe 3844 WerFault.exe 3844 WerFault.exe 3844 WerFault.exe 3844 WerFault.exe 3844 WerFault.exe 3844 WerFault.exe 3844 WerFault.exe 3844 WerFault.exe 3844 WerFault.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3920 SCD10093264.jpg.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3844 WerFault.exe Token: SeBackupPrivilege 3844 WerFault.exe Token: SeDebugPrivilege 3844 WerFault.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3920 wrote to memory of 2668 3920 SCD10093264.jpg.exe 77 PID 3920 wrote to memory of 2668 3920 SCD10093264.jpg.exe 77 PID 3920 wrote to memory of 2668 3920 SCD10093264.jpg.exe 77 PID 3920 wrote to memory of 2668 3920 SCD10093264.jpg.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\SCD10093264.jpg.exe"C:\Users\Admin\AppData\Local\Temp\SCD10093264.jpg.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\SCD10093264.jpg.exe"C:\Users\Admin\AppData\Local\Temp\SCD10093264.jpg.exe"2⤵
- Enumerates connected drives
PID:2668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2668 -s 226963⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3844
-
-