Analysis
-
max time kernel
1558s -
max time network
1561s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
09-08-2021 02:09
Static task
static1
Behavioral task
behavioral1
Sample
eresco.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
eresco.exe
-
Size
4.7MB
-
MD5
17b27ab5c49676aab24454868ca2adf7
-
SHA1
47028b12aa1257421b096f55d9d1fc68f6b8f72b
-
SHA256
5ac6766680c8c06a4b0b4e6a929ec4f5404fca75aa774f3eb986f81b1b30622b
-
SHA512
2938b181c8b17a9cab48168439a89aa1b4f6f67634d9faeb80946795db31d84ceca3c550e9feae9c0f391cccce5c30195e87bf633a0a8e2309544f23cc55866c
Malware Config
Extracted
Family
rustybuer
C2
https://bostauherde.com/
Signatures
-
Enumerates connected drives 3 TTPs 49 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
secinit.exedescription ioc process File opened (read-only) \??\j: secinit.exe File opened (read-only) \??\o: secinit.exe File opened (read-only) \??\x: secinit.exe File opened (read-only) \??\Z: secinit.exe File opened (read-only) \??\e: secinit.exe File opened (read-only) \??\G: secinit.exe File opened (read-only) \??\P: secinit.exe File opened (read-only) \??\W: secinit.exe File opened (read-only) \??\Y: secinit.exe File opened (read-only) \??\R: secinit.exe File opened (read-only) \??\S: secinit.exe File opened (read-only) \??\b: secinit.exe File opened (read-only) \??\E: secinit.exe File opened (read-only) \??\H: secinit.exe File opened (read-only) \??\I: secinit.exe File opened (read-only) \??\n: secinit.exe File opened (read-only) \??\N: secinit.exe File opened (read-only) \??\y: secinit.exe File opened (read-only) \??\v: secinit.exe File opened (read-only) \??\w: secinit.exe File opened (read-only) \??\F: secinit.exe File opened (read-only) \??\k: secinit.exe File opened (read-only) \??\K: secinit.exe File opened (read-only) \??\O: secinit.exe File opened (read-only) \??\s: secinit.exe File opened (read-only) \??\t: secinit.exe File opened (read-only) \??\B: secinit.exe File opened (read-only) \??\D: secinit.exe File opened (read-only) \??\h: secinit.exe File opened (read-only) \??\p: secinit.exe File opened (read-only) \??\r: secinit.exe File opened (read-only) \??\X: secinit.exe File opened (read-only) \??\Q: secinit.exe File opened (read-only) \??\V: secinit.exe File opened (read-only) \??\a: secinit.exe File opened (read-only) \??\i: secinit.exe File opened (read-only) \??\J: secinit.exe File opened (read-only) \??\L: secinit.exe File opened (read-only) \??\m: secinit.exe File opened (read-only) \??\M: secinit.exe File opened (read-only) \??\A: secinit.exe File opened (read-only) \??\g: secinit.exe File opened (read-only) \??\l: secinit.exe File opened (read-only) \??\q: secinit.exe File opened (read-only) \??\U: secinit.exe File opened (read-only) \??\f: secinit.exe File opened (read-only) \??\T: secinit.exe File opened (read-only) \??\u: secinit.exe File opened (read-only) \??\z: secinit.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
eresco.exedescription pid process target process PID 1748 set thread context of 808 1748 eresco.exe secinit.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
secinit.exepid process 808 secinit.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
eresco.exedescription pid process target process PID 1748 wrote to memory of 808 1748 eresco.exe secinit.exe PID 1748 wrote to memory of 808 1748 eresco.exe secinit.exe PID 1748 wrote to memory of 808 1748 eresco.exe secinit.exe PID 1748 wrote to memory of 808 1748 eresco.exe secinit.exe PID 1748 wrote to memory of 808 1748 eresco.exe secinit.exe PID 1748 wrote to memory of 808 1748 eresco.exe secinit.exe PID 1748 wrote to memory of 808 1748 eresco.exe secinit.exe PID 1748 wrote to memory of 808 1748 eresco.exe secinit.exe PID 1748 wrote to memory of 808 1748 eresco.exe secinit.exe PID 1748 wrote to memory of 808 1748 eresco.exe secinit.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eresco.exe"C:\Users\Admin\AppData\Local\Temp\eresco.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\secinit.exe"C:\Windows\System32\secinit.exe"2⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
PID:808
-