Analysis
-
max time kernel
70s -
max time network
77s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
11-05-2022 23:23
Static task
static1
Behavioral task
behavioral1
Sample
1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe
-
Size
558KB
-
MD5
b1b1b46182236ad1ca363773c4a601df
-
SHA1
4563f3a7790e988c825796dfa0f3e1ec4ddb2d70
-
SHA256
1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a
-
SHA512
2f3f04cdb4c32f26ff86b09cb350934036f317413b0a494e4059af6d659719e8a129264a8c47bbcdfd88eb77060fb1030cca9d5f52f4f05c62e12ebfab99ed9f
Malware Config
Extracted
Family
buer
C2
https://bankcreditsign.com/
Signatures
-
resource yara_rule behavioral1/memory/2032-54-0x00000000004D0000-0x0000000000530000-memory.dmp buer behavioral1/memory/2032-59-0x0000000040000000-0x000000004005D000-memory.dmp buer behavioral1/memory/2032-64-0x0000000000360000-0x00000000003BE000-memory.dmp buer -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\Z: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\F: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\H: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\N: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\R: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\W: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\U: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\G: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\K: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\L: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\M: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\Q: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\E: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\S: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\P: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\T: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\V: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\A: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\B: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\I: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\J: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\O: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\Y: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1680 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1680 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1680 2032 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe 27 PID 2032 wrote to memory of 1680 2032 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe 27 PID 2032 wrote to memory of 1680 2032 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe 27 PID 2032 wrote to memory of 1680 2032 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe"C:\Users\Admin\AppData\Local\Temp\1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe"1⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "& {Add-MpPreference -ExclusionPath C:\ProgramData\2ae69ff1a62350aedeed}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1680
-