Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
14-05-2021 05:55
Static task
static1
Behavioral task
behavioral1
Sample
214053f.bin.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
214053f.bin.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
214053f.bin.exe
-
Size
38KB
-
MD5
1f4ce9581d372c6297794233cbeca1ea
-
SHA1
c9661c46db129433e350d1ca3fd0ebd79b190f88
-
SHA256
f23db00ee052d07bf66ce6aa644ead488e182dfb21c4c5c42bb9677db839a310
-
SHA512
571c4a811586bf26b3de8cbcc59be0b27f4fb58826844e8ef73dcf8c61af8c918dd8c06f42339867b4877f00ab11e8ec8d1901afbde57e967748ccd23425447f
Score
10/10
Malware Config
Extracted
Family
buer
C2
https://162.244.81.87/
http://162.244.81.87:8080/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\29ff734d026e5d3a89a0\\gennt.exe\"" gennt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\29ff734d026e5d3a89a0\\gennt.exe\"" secinit.exe -
Buer Loader 4 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral2/files/0x000300000001a2e0-115.dat buer behavioral2/files/0x000300000001a2e0-116.dat buer behavioral2/memory/3792-117-0x0000000000000000-mapping.dmp buer behavioral2/memory/3792-119-0x0000000000940000-0x000000000094C000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 3812 gennt.exe -
Deletes itself 1 IoCs
pid Process 3812 gennt.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: secinit.exe File opened (read-only) \??\H: secinit.exe File opened (read-only) \??\T: secinit.exe File opened (read-only) \??\W: secinit.exe File opened (read-only) \??\O: secinit.exe File opened (read-only) \??\P: secinit.exe File opened (read-only) \??\S: secinit.exe File opened (read-only) \??\Y: secinit.exe File opened (read-only) \??\B: secinit.exe File opened (read-only) \??\E: secinit.exe File opened (read-only) \??\G: secinit.exe File opened (read-only) \??\K: secinit.exe File opened (read-only) \??\X: secinit.exe File opened (read-only) \??\A: secinit.exe File opened (read-only) \??\I: secinit.exe File opened (read-only) \??\J: secinit.exe File opened (read-only) \??\R: secinit.exe File opened (read-only) \??\U: secinit.exe File opened (read-only) \??\V: secinit.exe File opened (read-only) \??\Z: secinit.exe File opened (read-only) \??\L: secinit.exe File opened (read-only) \??\M: secinit.exe File opened (read-only) \??\N: secinit.exe File opened (read-only) \??\Q: secinit.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3792 secinit.exe 3792 secinit.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3972 wrote to memory of 3812 3972 214053f.bin.exe 78 PID 3972 wrote to memory of 3812 3972 214053f.bin.exe 78 PID 3972 wrote to memory of 3812 3972 214053f.bin.exe 78 PID 3812 wrote to memory of 3792 3812 gennt.exe 79 PID 3812 wrote to memory of 3792 3812 gennt.exe 79 PID 3812 wrote to memory of 3792 3812 gennt.exe 79 PID 3812 wrote to memory of 3792 3812 gennt.exe 79 PID 3812 wrote to memory of 3792 3812 gennt.exe 79 PID 3812 wrote to memory of 3792 3812 gennt.exe 79 PID 3812 wrote to memory of 3792 3812 gennt.exe 79 PID 3812 wrote to memory of 3792 3812 gennt.exe 79 PID 3812 wrote to memory of 3792 3812 gennt.exe 79 PID 3812 wrote to memory of 3792 3812 gennt.exe 79 PID 3792 wrote to memory of 3692 3792 secinit.exe 80 PID 3792 wrote to memory of 3692 3792 secinit.exe 80 PID 3792 wrote to memory of 3692 3792 secinit.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\214053f.bin.exe"C:\Users\Admin\AppData\Local\Temp\214053f.bin.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\ProgramData\29ff734d026e5d3a89a0\gennt.exeC:\ProgramData\29ff734d026e5d3a89a0\gennt.exe "C:\Users\Admin\AppData\Local\Temp\214053f.bin.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\29ff734d026e5d3a89a0\gennt.exe3⤵
- Modifies WinLogon for persistence
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" powershell.exe -Command "& {Add-MpPreference -ExclusionPath C:\ProgramData\29ff734d026e5d3a89a0}"4⤵PID:3692
-
-
-