Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
14-12-2021 07:05
Static task
static1
Behavioral task
behavioral1
Sample
15097d2f74343c844eddaf977e411939b5060d9be365ac28b34c2c3d489f0b41.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
15097d2f74343c844eddaf977e411939b5060d9be365ac28b34c2c3d489f0b41.dll
Resource
win10-en-20211208
General
-
Target
15097d2f74343c844eddaf977e411939b5060d9be365ac28b34c2c3d489f0b41.dll
-
Size
522KB
-
MD5
84702bd6e798481f81066c1e0671ae03
-
SHA1
c53a1d8aa4495cb5acf07ddc069153fbecd37a91
-
SHA256
15097d2f74343c844eddaf977e411939b5060d9be365ac28b34c2c3d489f0b41
-
SHA512
802b350012e73bb3adbb59492d22db33cff7f67084975eb054f969908cab2826945a01f4086e08f88e176a1da2248b5c852d02d3f086c2a036ccddd286367fb4
Malware Config
Extracted
matanbuchus
https://belialq449663.at/f5126584-3f68-4e0c-868a-dcb2455f8146/Y2xpbnRvbjQ1.xml
https://belialw869367.at/f5126584-3f68-4e0c-868a-dcb2455f8146/Y2xpbnRvbjQ1.xml
https://beliale232634.at/b0868b6b-7f2c-4ac6-ba54-ba9b13744d17/clinton45.xml
https://belialr878539.at/b0868b6b-7f2c-4ac6-ba54-ba9b13744d17/clinton45.xml
https://belialp632298.at/b0868b6b-7f2c-4ac6-ba54-ba9b13744d17/clinton45.xml
Signatures
-
Matanbuchus
A loader sold as MaaS first seen in February 2021.
-
Program crash 1 IoCs
pid pid_target Process procid_target 648 3880 WerFault.exe 69 -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 648 WerFault.exe 648 WerFault.exe 648 WerFault.exe 648 WerFault.exe 648 WerFault.exe 648 WerFault.exe 648 WerFault.exe 648 WerFault.exe 648 WerFault.exe 648 WerFault.exe 648 WerFault.exe 648 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 648 WerFault.exe Token: SeBackupPrivilege 648 WerFault.exe Token: SeDebugPrivilege 648 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2760 wrote to memory of 3880 2760 rundll32.exe 69 PID 2760 wrote to memory of 3880 2760 rundll32.exe 69 PID 2760 wrote to memory of 3880 2760 rundll32.exe 69
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\15097d2f74343c844eddaf977e411939b5060d9be365ac28b34c2c3d489f0b41.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\15097d2f74343c844eddaf977e411939b5060d9be365ac28b34c2c3d489f0b41.dll,#12⤵PID:3880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3880 -s 6923⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:648
-
-