Resubmissions
13-02-2021 05:16
210213-atnqs85c7a 1013-02-2021 00:12
210213-k9zhewha3j 1002-02-2021 12:35
210202-vg7em3tbxn 10Analysis
-
max time kernel
305s -
max time network
122s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13-02-2021 05:16
Static task
static1
Behavioral task
behavioral1
Sample
d0b8e002997a8fed4ec8ec7996a4c7fabd360a7119d388c632d00ff1405269a6.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
d0b8e002997a8fed4ec8ec7996a4c7fabd360a7119d388c632d00ff1405269a6.exe
-
Size
22KB
-
MD5
1c3fd3a47171b6312cb28d996da0a0d9
-
SHA1
7e53bcbf99a3d164431b0318fe4ccb8cfe7da40a
-
SHA256
d0b8e002997a8fed4ec8ec7996a4c7fabd360a7119d388c632d00ff1405269a6
-
SHA512
762c3d63fa49f972e4e37b0be9627575f24f9527960450f640835c06b72909a9237aac749adf6b77a52790f17358106887d6cb630a196727d00ef113daf05892
Score
10/10
Malware Config
Extracted
Family
buer
C2
http://95.216.251.221:8080/
Signatures
-
Buer Loader 2 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral1/files/0x000100000001ab65-3.dat buer behavioral1/files/0x000100000001ab65-4.dat buer -
Executes dropped EXE 1 IoCs
pid Process 3240 manager.exe -
Deletes itself 1 IoCs
pid Process 3240 manager.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce manager.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ActiveX Component = "C:\\Users\\Admin\\AppData\\Roaming\\ActiveX\\manager.exe꼀" manager.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 580 wrote to memory of 3240 580 d0b8e002997a8fed4ec8ec7996a4c7fabd360a7119d388c632d00ff1405269a6.exe 78 PID 580 wrote to memory of 3240 580 d0b8e002997a8fed4ec8ec7996a4c7fabd360a7119d388c632d00ff1405269a6.exe 78 PID 580 wrote to memory of 3240 580 d0b8e002997a8fed4ec8ec7996a4c7fabd360a7119d388c632d00ff1405269a6.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0b8e002997a8fed4ec8ec7996a4c7fabd360a7119d388c632d00ff1405269a6.exe"C:\Users\Admin\AppData\Local\Temp\d0b8e002997a8fed4ec8ec7996a4c7fabd360a7119d388c632d00ff1405269a6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Users\Admin\AppData\Roaming\ActiveX\manager.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe "C:\Users\Admin\AppData\Local\Temp\d0b8e002997a8fed4ec8ec7996a4c7fabd360a7119d388c632d00ff1405269a6.exe" ensgJJ2⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
PID:3240
-