Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
14-05-2021 06:02
Static task
static1
Behavioral task
behavioral1
Sample
214053f.bin.exe
Resource
win7v20210410
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
214053f.bin.exe
Resource
win10v20210410
0 signatures
0 seconds
General
-
Target
214053f.bin.exe
-
Size
38KB
-
MD5
1f4ce9581d372c6297794233cbeca1ea
-
SHA1
c9661c46db129433e350d1ca3fd0ebd79b190f88
-
SHA256
f23db00ee052d07bf66ce6aa644ead488e182dfb21c4c5c42bb9677db839a310
-
SHA512
571c4a811586bf26b3de8cbcc59be0b27f4fb58826844e8ef73dcf8c61af8c918dd8c06f42339867b4877f00ab11e8ec8d1901afbde57e967748ccd23425447f
Score
10/10
Malware Config
Extracted
Family
buer
C2
https://162.244.81.87/
http://162.244.81.87:8080/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\48d55184c791ab67146c\\gennt.exe\"" gennt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\48d55184c791ab67146c\\gennt.exe\"" secinit.exe -
Buer Loader 4 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral2/files/0x000300000001a2e0-115.dat buer behavioral2/files/0x000300000001a2e0-116.dat buer behavioral2/memory/2720-117-0x0000000000000000-mapping.dmp buer behavioral2/memory/2720-120-0x0000000000F60000-0x0000000000F6C000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 1356 gennt.exe -
Deletes itself 1 IoCs
pid Process 1356 gennt.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: secinit.exe File opened (read-only) \??\E: secinit.exe File opened (read-only) \??\F: secinit.exe File opened (read-only) \??\G: secinit.exe File opened (read-only) \??\P: secinit.exe File opened (read-only) \??\U: secinit.exe File opened (read-only) \??\V: secinit.exe File opened (read-only) \??\R: secinit.exe File opened (read-only) \??\W: secinit.exe File opened (read-only) \??\B: secinit.exe File opened (read-only) \??\H: secinit.exe File opened (read-only) \??\L: secinit.exe File opened (read-only) \??\M: secinit.exe File opened (read-only) \??\N: secinit.exe File opened (read-only) \??\Q: secinit.exe File opened (read-only) \??\X: secinit.exe File opened (read-only) \??\Z: secinit.exe File opened (read-only) \??\A: secinit.exe File opened (read-only) \??\I: secinit.exe File opened (read-only) \??\K: secinit.exe File opened (read-only) \??\S: secinit.exe File opened (read-only) \??\J: secinit.exe File opened (read-only) \??\O: secinit.exe File opened (read-only) \??\T: secinit.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2720 secinit.exe 2720 secinit.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3724 wrote to memory of 1356 3724 214053f.bin.exe 79 PID 3724 wrote to memory of 1356 3724 214053f.bin.exe 79 PID 3724 wrote to memory of 1356 3724 214053f.bin.exe 79 PID 1356 wrote to memory of 2720 1356 gennt.exe 80 PID 1356 wrote to memory of 2720 1356 gennt.exe 80 PID 1356 wrote to memory of 2720 1356 gennt.exe 80 PID 1356 wrote to memory of 2720 1356 gennt.exe 80 PID 1356 wrote to memory of 2720 1356 gennt.exe 80 PID 1356 wrote to memory of 2720 1356 gennt.exe 80 PID 1356 wrote to memory of 2720 1356 gennt.exe 80 PID 1356 wrote to memory of 2720 1356 gennt.exe 80 PID 1356 wrote to memory of 2720 1356 gennt.exe 80 PID 1356 wrote to memory of 2720 1356 gennt.exe 80 PID 2720 wrote to memory of 4092 2720 secinit.exe 81 PID 2720 wrote to memory of 4092 2720 secinit.exe 81 PID 2720 wrote to memory of 4092 2720 secinit.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\214053f.bin.exe"C:\Users\Admin\AppData\Local\Temp\214053f.bin.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\ProgramData\48d55184c791ab67146c\gennt.exeC:\ProgramData\48d55184c791ab67146c\gennt.exe "C:\Users\Admin\AppData\Local\Temp\214053f.bin.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\48d55184c791ab67146c\gennt.exe3⤵
- Modifies WinLogon for persistence
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" powershell.exe -Command "& {Add-MpPreference -ExclusionPath C:\ProgramData\48d55184c791ab67146c}"4⤵PID:4092
-
-
-