Analysis
-
max time kernel
188s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
11-05-2022 23:23
Static task
static1
Behavioral task
behavioral1
Sample
1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe
-
Size
558KB
-
MD5
b1b1b46182236ad1ca363773c4a601df
-
SHA1
4563f3a7790e988c825796dfa0f3e1ec4ddb2d70
-
SHA256
1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a
-
SHA512
2f3f04cdb4c32f26ff86b09cb350934036f317413b0a494e4059af6d659719e8a129264a8c47bbcdfd88eb77060fb1030cca9d5f52f4f05c62e12ebfab99ed9f
Malware Config
Extracted
Family
buer
C2
https://bankcreditsign.com/
Signatures
-
resource yara_rule behavioral2/memory/2344-130-0x0000000000790000-0x00000000007F0000-memory.dmp buer behavioral2/memory/2344-134-0x0000000040000000-0x000000004005D000-memory.dmp buer behavioral2/memory/2344-138-0x0000000000730000-0x000000000078E000-memory.dmp buer -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\J: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\M: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\P: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\Q: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\Z: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\A: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\B: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\G: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\S: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\V: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\Y: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\E: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\H: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\I: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\L: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\O: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\U: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\X: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\K: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\N: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\R: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\T: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe File opened (read-only) \??\W: 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1684 powershell.exe 1684 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1684 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2344 wrote to memory of 1684 2344 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe 85 PID 2344 wrote to memory of 1684 2344 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe 85 PID 2344 wrote to memory of 1684 2344 1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe"C:\Users\Admin\AppData\Local\Temp\1e06ef556ce681f14ed8fe9cfd3ebba0dfd2ec97602cfa39b99bec9a7437ed1a.exe"1⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "& {Add-MpPreference -ExclusionPath C:\ProgramData\089255fc2f67b63118ab}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1684
-