Analysis

  • max time kernel
    39s
  • max time network
    43s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    17-04-2022 14:39

General

  • Target

    9678bf2faa844be6d7919e0f4dd9b31366d63dc9bc17c88642e33b6ab3b20ce7.exe

  • Size

    6.6MB

  • MD5

    b18acf64909d55d9919fd796fc65a5f3

  • SHA1

    2bbea10af479a63c39f2ffda1337042941375248

  • SHA256

    9678bf2faa844be6d7919e0f4dd9b31366d63dc9bc17c88642e33b6ab3b20ce7

  • SHA512

    a24f39d9f6ee3d4f2e65f28da1446084cf8cda4df3bf6364d4da235c19c4601d60541f2bc665855346be7a920260dae5e550980f8521392b829184e534f2a8f4

Score
10/10

Malware Config

Signatures

  • Buer

    Buer is a new modular loader first seen in August 2019.

  • Buer Loader 3 IoCs

    Detects Buer loader in memory or disk.

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9678bf2faa844be6d7919e0f4dd9b31366d63dc9bc17c88642e33b6ab3b20ce7.exe
    "C:\Users\Admin\AppData\Local\Temp\9678bf2faa844be6d7919e0f4dd9b31366d63dc9bc17c88642e33b6ab3b20ce7.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious use of SetWindowsHookEx
    PID:1296

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1296-54-0x0000000074F21000-0x0000000074F23000-memory.dmp

    Filesize

    8KB

  • memory/1296-55-0x0000000000AA0000-0x0000000000AAC000-memory.dmp

    Filesize

    48KB

  • memory/1296-59-0x0000000040000000-0x0000000040009000-memory.dmp

    Filesize

    36KB

  • memory/1296-62-0x00000000003F0000-0x00000000003F9000-memory.dmp

    Filesize

    36KB