Analysis

  • max time kernel
    91s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    27/06/2021, 11:29 UTC

General

  • Target

    AnnualReport.exe

  • Size

    3.1MB

  • MD5

    7908cc9996b7423c766157d8119df254

  • SHA1

    7974b277a69b8c811734a6ad30f3ad1f523d3503

  • SHA256

    6b665a866997d39ba17c6b687693c71b4d4a622d016ad7e0c37bc735524858be

  • SHA512

    8fc36eeef99a7e3df702672bc0f19077324cda0a17af0c75818d9f11c44c7c51d2d8b51290775ef22aedfb809a1b718a9593cf4777334d8b44d37a75e07c5554

Score
10/10

Malware Config

Extracted

Family

buer

C2

https://itofficemasword.com/

Signatures

  • Buer

    Buer is a new modular loader first seen in August 2019.

  • Buer Loader 3 IoCs

    Detects Buer loader in memory or disk.

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AnnualReport.exe
    "C:\Users\Admin\AppData\Local\Temp\AnnualReport.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1916
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -Command "& {Add-MpPreference -ExclusionPath C:\ProgramData\6776288a4e1c2b584a01}"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:648

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/648-72-0x0000000004802000-0x0000000004803000-memory.dmp

    Filesize

    4KB

  • memory/648-74-0x0000000005240000-0x0000000005241000-memory.dmp

    Filesize

    4KB

  • memory/648-107-0x0000000006310000-0x0000000006311000-memory.dmp

    Filesize

    4KB

  • memory/648-73-0x00000000025D0000-0x00000000025D1000-memory.dmp

    Filesize

    4KB

  • memory/648-69-0x0000000001EB0000-0x0000000001EB1000-memory.dmp

    Filesize

    4KB

  • memory/648-70-0x0000000004840000-0x0000000004841000-memory.dmp

    Filesize

    4KB

  • memory/648-71-0x0000000004800000-0x0000000004801000-memory.dmp

    Filesize

    4KB

  • memory/648-106-0x0000000006300000-0x0000000006301000-memory.dmp

    Filesize

    4KB

  • memory/648-92-0x00000000055D0000-0x00000000055D1000-memory.dmp

    Filesize

    4KB

  • memory/648-91-0x0000000006200000-0x0000000006201000-memory.dmp

    Filesize

    4KB

  • memory/648-77-0x0000000005680000-0x0000000005681000-memory.dmp

    Filesize

    4KB

  • memory/648-82-0x00000000056C0000-0x00000000056C1000-memory.dmp

    Filesize

    4KB

  • memory/648-83-0x00000000060C0000-0x00000000060C1000-memory.dmp

    Filesize

    4KB

  • memory/648-90-0x000000007EF30000-0x000000007EF31000-memory.dmp

    Filesize

    4KB

  • memory/1916-66-0x0000000000370000-0x00000000003CD000-memory.dmp

    Filesize

    372KB

  • memory/1916-60-0x0000000075201000-0x0000000075203000-memory.dmp

    Filesize

    8KB

  • memory/1916-61-0x0000000000720000-0x0000000000780000-memory.dmp

    Filesize

    384KB

  • memory/1916-64-0x0000000040000000-0x000000004005E000-memory.dmp

    Filesize

    376KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.