Analysis
-
max time kernel
91s -
max time network
47s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
27/06/2021, 11:29 UTC
Static task
static1
Behavioral task
behavioral1
Sample
AnnualReport.exe
Resource
win7v20210408
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
AnnualReport.exe
Resource
win10v20210410
0 signatures
0 seconds
General
-
Target
AnnualReport.exe
-
Size
3.1MB
-
MD5
7908cc9996b7423c766157d8119df254
-
SHA1
7974b277a69b8c811734a6ad30f3ad1f523d3503
-
SHA256
6b665a866997d39ba17c6b687693c71b4d4a622d016ad7e0c37bc735524858be
-
SHA512
8fc36eeef99a7e3df702672bc0f19077324cda0a17af0c75818d9f11c44c7c51d2d8b51290775ef22aedfb809a1b718a9593cf4777334d8b44d37a75e07c5554
Malware Config
Extracted
Family
buer
C2
https://itofficemasword.com/
Signatures
-
Buer Loader 3 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral1/memory/1916-61-0x0000000000720000-0x0000000000780000-memory.dmp buer behavioral1/memory/1916-64-0x0000000040000000-0x000000004005E000-memory.dmp buer behavioral1/memory/1916-66-0x0000000000370000-0x00000000003CD000-memory.dmp buer -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: AnnualReport.exe File opened (read-only) \??\B: AnnualReport.exe File opened (read-only) \??\G: AnnualReport.exe File opened (read-only) \??\W: AnnualReport.exe File opened (read-only) \??\L: AnnualReport.exe File opened (read-only) \??\M: AnnualReport.exe File opened (read-only) \??\N: AnnualReport.exe File opened (read-only) \??\O: AnnualReport.exe File opened (read-only) \??\Q: AnnualReport.exe File opened (read-only) \??\E: AnnualReport.exe File opened (read-only) \??\H: AnnualReport.exe File opened (read-only) \??\K: AnnualReport.exe File opened (read-only) \??\S: AnnualReport.exe File opened (read-only) \??\U: AnnualReport.exe File opened (read-only) \??\V: AnnualReport.exe File opened (read-only) \??\Z: AnnualReport.exe File opened (read-only) \??\P: AnnualReport.exe File opened (read-only) \??\R: AnnualReport.exe File opened (read-only) \??\X: AnnualReport.exe File opened (read-only) \??\J: AnnualReport.exe File opened (read-only) \??\T: AnnualReport.exe File opened (read-only) \??\A: AnnualReport.exe File opened (read-only) \??\F: AnnualReport.exe File opened (read-only) \??\I: AnnualReport.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 648 powershell.exe 648 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 648 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1916 AnnualReport.exe 1916 AnnualReport.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1916 wrote to memory of 648 1916 AnnualReport.exe 29 PID 1916 wrote to memory of 648 1916 AnnualReport.exe 29 PID 1916 wrote to memory of 648 1916 AnnualReport.exe 29 PID 1916 wrote to memory of 648 1916 AnnualReport.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\AnnualReport.exe"C:\Users\Admin\AppData\Local\Temp\AnnualReport.exe"1⤵
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "& {Add-MpPreference -ExclusionPath C:\ProgramData\6776288a4e1c2b584a01}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:648
-