Analysis
-
max time kernel
123s -
max time network
131s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
14-12-2021 07:05
Static task
static1
Behavioral task
behavioral1
Sample
647230baf87469b45f90d441ec31b60acd021896a6d26a1cc223fc83d659812e.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
647230baf87469b45f90d441ec31b60acd021896a6d26a1cc223fc83d659812e.dll
Resource
win10-en-20211208
General
-
Target
647230baf87469b45f90d441ec31b60acd021896a6d26a1cc223fc83d659812e.dll
-
Size
522KB
-
MD5
6db05064d40df7fcb691dc518ff16d8b
-
SHA1
e677bc818dcf532b225bcf2105f5b7a234eebb1a
-
SHA256
647230baf87469b45f90d441ec31b60acd021896a6d26a1cc223fc83d659812e
-
SHA512
6882a358f8caf744970a062f7a23cbb5c2182f285f299634dd26dc4f2e41ff8a93fdb00aac7caa577fe3140107e7c788c98d6741b34c8d2472f7f0846d705056
Malware Config
Extracted
matanbuchus
https://belialq449663.at/f5126584-3f68-4e0c-868a-dcb2455f8146/Y2xpbnRvbjQ1.xml
https://belialw869367.at/f5126584-3f68-4e0c-868a-dcb2455f8146/Y2xpbnRvbjQ1.xml
https://beliale232634.at/b0868b6b-7f2c-4ac6-ba54-ba9b13744d17/clinton45.xml
https://belialr878539.at/b0868b6b-7f2c-4ac6-ba54-ba9b13744d17/clinton45.xml
https://belialp632298.at/b0868b6b-7f2c-4ac6-ba54-ba9b13744d17/clinton45.xml
Signatures
-
Matanbuchus
A loader sold as MaaS first seen in February 2021.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1344 3988 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
WerFault.exepid process 1344 WerFault.exe 1344 WerFault.exe 1344 WerFault.exe 1344 WerFault.exe 1344 WerFault.exe 1344 WerFault.exe 1344 WerFault.exe 1344 WerFault.exe 1344 WerFault.exe 1344 WerFault.exe 1344 WerFault.exe 1344 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 1344 WerFault.exe Token: SeBackupPrivilege 1344 WerFault.exe Token: SeDebugPrivilege 1344 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3496 wrote to memory of 3988 3496 rundll32.exe rundll32.exe PID 3496 wrote to memory of 3988 3496 rundll32.exe rundll32.exe PID 3496 wrote to memory of 3988 3496 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\647230baf87469b45f90d441ec31b60acd021896a6d26a1cc223fc83d659812e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\647230baf87469b45f90d441ec31b60acd021896a6d26a1cc223fc83d659812e.dll,#12⤵PID:3988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 6923⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1344
-
-