Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
14-12-2021 07:05
Static task
static1
Behavioral task
behavioral1
Sample
0634f6c10ac079514d4db0ec04d842c48448538f3f636963d1ef17111bedc72a.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0634f6c10ac079514d4db0ec04d842c48448538f3f636963d1ef17111bedc72a.dll
Resource
win10-en-20211208
General
-
Target
0634f6c10ac079514d4db0ec04d842c48448538f3f636963d1ef17111bedc72a.dll
-
Size
522KB
-
MD5
aaf943c5a95b3dd813c441d3bdca0e5a
-
SHA1
529a1793f8019042952a379bbd91da51e02aa2b1
-
SHA256
0634f6c10ac079514d4db0ec04d842c48448538f3f636963d1ef17111bedc72a
-
SHA512
647ae31e6bbe7e8646c75d8d52a2c6e5f81eb9c815821fda164ba21d6754052f9c49a9048fac4ec976ba9d234599e0b9abdd6f278b422329a5f244bbcf570297
Malware Config
Extracted
matanbuchus
https://belialq449663.at/f5126584-3f68-4e0c-868a-dcb2455f8146/Y2xpbnRvbjQ1.xml
https://belialw869367.at/f5126584-3f68-4e0c-868a-dcb2455f8146/Y2xpbnRvbjQ1.xml
https://beliale232634.at/b0868b6b-7f2c-4ac6-ba54-ba9b13744d17/clinton45.xml
https://belialr878539.at/b0868b6b-7f2c-4ac6-ba54-ba9b13744d17/clinton45.xml
https://belialp632298.at/b0868b6b-7f2c-4ac6-ba54-ba9b13744d17/clinton45.xml
Signatures
-
Matanbuchus
A loader sold as MaaS first seen in February 2021.
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1276 wrote to memory of 1556 1276 rundll32.exe 27 PID 1276 wrote to memory of 1556 1276 rundll32.exe 27 PID 1276 wrote to memory of 1556 1276 rundll32.exe 27 PID 1276 wrote to memory of 1556 1276 rundll32.exe 27 PID 1276 wrote to memory of 1556 1276 rundll32.exe 27 PID 1276 wrote to memory of 1556 1276 rundll32.exe 27 PID 1276 wrote to memory of 1556 1276 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0634f6c10ac079514d4db0ec04d842c48448538f3f636963d1ef17111bedc72a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0634f6c10ac079514d4db0ec04d842c48448538f3f636963d1ef17111bedc72a.dll,#12⤵PID:1556
-