General

  • Target

    document.xlsm

  • Size

    53KB

  • Sample

    210820-a8tymxf36j

  • MD5

    50097dcbf3f4071e621ebbf3911d6ed5

  • SHA1

    eef3fad484c512b778a25d931edba6726d39f5f3

  • SHA256

    adf1d9e22efc7d95a57aa8754fe5e489380c52de240167930f7043d079e34144

  • SHA512

    6067d055751c17e701ccca54c87af094bf8c8434728978f296887da3592f2021275cf5cff5b4f9c3c67bb427fa46cce228a2d89e863cf2cc561adf47720135c9

Score
10/10

Malware Config

Extracted

Family

rustybuer

C2

https://awmelisers.com/

Targets

    • Target

      document.xlsm

    • Size

      53KB

    • MD5

      50097dcbf3f4071e621ebbf3911d6ed5

    • SHA1

      eef3fad484c512b778a25d931edba6726d39f5f3

    • SHA256

      adf1d9e22efc7d95a57aa8754fe5e489380c52de240167930f7043d079e34144

    • SHA512

      6067d055751c17e701ccca54c87af094bf8c8434728978f296887da3592f2021275cf5cff5b4f9c3c67bb427fa46cce228a2d89e863cf2cc561adf47720135c9

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • RustyBuer

      RustyBuer is a new variant of Buer loader written in Rust.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Tasks