Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
14-12-2021 07:05
Static task
static1
Behavioral task
behavioral1
Sample
647230baf87469b45f90d441ec31b60acd021896a6d26a1cc223fc83d659812e.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
647230baf87469b45f90d441ec31b60acd021896a6d26a1cc223fc83d659812e.dll
Resource
win10-en-20211208
General
-
Target
647230baf87469b45f90d441ec31b60acd021896a6d26a1cc223fc83d659812e.dll
-
Size
522KB
-
MD5
6db05064d40df7fcb691dc518ff16d8b
-
SHA1
e677bc818dcf532b225bcf2105f5b7a234eebb1a
-
SHA256
647230baf87469b45f90d441ec31b60acd021896a6d26a1cc223fc83d659812e
-
SHA512
6882a358f8caf744970a062f7a23cbb5c2182f285f299634dd26dc4f2e41ff8a93fdb00aac7caa577fe3140107e7c788c98d6741b34c8d2472f7f0846d705056
Malware Config
Extracted
matanbuchus
https://belialq449663.at/f5126584-3f68-4e0c-868a-dcb2455f8146/Y2xpbnRvbjQ1.xml
https://belialw869367.at/f5126584-3f68-4e0c-868a-dcb2455f8146/Y2xpbnRvbjQ1.xml
https://beliale232634.at/b0868b6b-7f2c-4ac6-ba54-ba9b13744d17/clinton45.xml
https://belialr878539.at/b0868b6b-7f2c-4ac6-ba54-ba9b13744d17/clinton45.xml
https://belialp632298.at/b0868b6b-7f2c-4ac6-ba54-ba9b13744d17/clinton45.xml
Signatures
-
Matanbuchus
A loader sold as MaaS first seen in February 2021.
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1180 wrote to memory of 1804 1180 rundll32.exe rundll32.exe PID 1180 wrote to memory of 1804 1180 rundll32.exe rundll32.exe PID 1180 wrote to memory of 1804 1180 rundll32.exe rundll32.exe PID 1180 wrote to memory of 1804 1180 rundll32.exe rundll32.exe PID 1180 wrote to memory of 1804 1180 rundll32.exe rundll32.exe PID 1180 wrote to memory of 1804 1180 rundll32.exe rundll32.exe PID 1180 wrote to memory of 1804 1180 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\647230baf87469b45f90d441ec31b60acd021896a6d26a1cc223fc83d659812e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\647230baf87469b45f90d441ec31b60acd021896a6d26a1cc223fc83d659812e.dll,#12⤵PID:1804
-