Analysis
-
max time kernel
69s -
max time network
76s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
24-05-2022 23:05
Behavioral task
behavioral1
Sample
1f8595d066ee69e7454b30b718102bbd04122ba8a5bab1e9d5f4532b7a7305a3.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1f8595d066ee69e7454b30b718102bbd04122ba8a5bab1e9d5f4532b7a7305a3.exe
Resource
win10v2004-20220414-en
General
-
Target
1f8595d066ee69e7454b30b718102bbd04122ba8a5bab1e9d5f4532b7a7305a3.exe
-
Size
40KB
-
MD5
b808bcbb1d9b94a4a71899964255ce0e
-
SHA1
c5e899db34a976f8396cdde8044ebb5ca67a513f
-
SHA256
1f8595d066ee69e7454b30b718102bbd04122ba8a5bab1e9d5f4532b7a7305a3
-
SHA512
6f1c8f6fd0ad1ded7a5ab3e39a45f0ca22bc12100117b3a58f613184069128e7e21b7685262f3647408c6871ea8a5e2a07e53379634f65a45b71552d69620ff9
Malware Config
Extracted
buer
frrnq8--imp_j_i,fi-
Signatures
-
resource yara_rule behavioral1/files/0x000a0000000122be-55.dat buer behavioral1/files/0x000a0000000122be-58.dat buer behavioral1/files/0x000a0000000122be-56.dat buer behavioral1/files/0x000a0000000122be-60.dat buer -
Executes dropped EXE 1 IoCs
pid Process 2040 manager.exe -
Deletes itself 1 IoCs
pid Process 2040 manager.exe -
Loads dropped DLL 2 IoCs
pid Process 960 1f8595d066ee69e7454b30b718102bbd04122ba8a5bab1e9d5f4532b7a7305a3.exe 960 1f8595d066ee69e7454b30b718102bbd04122ba8a5bab1e9d5f4532b7a7305a3.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce manager.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ActiveX Component = "C:\\Users\\Admin\\AppData\\Roaming\\ActiveX\\manager.exe" manager.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2040 manager.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 960 wrote to memory of 2040 960 1f8595d066ee69e7454b30b718102bbd04122ba8a5bab1e9d5f4532b7a7305a3.exe 28 PID 960 wrote to memory of 2040 960 1f8595d066ee69e7454b30b718102bbd04122ba8a5bab1e9d5f4532b7a7305a3.exe 28 PID 960 wrote to memory of 2040 960 1f8595d066ee69e7454b30b718102bbd04122ba8a5bab1e9d5f4532b7a7305a3.exe 28 PID 960 wrote to memory of 2040 960 1f8595d066ee69e7454b30b718102bbd04122ba8a5bab1e9d5f4532b7a7305a3.exe 28 PID 2040 wrote to memory of 2000 2040 manager.exe 29 PID 2040 wrote to memory of 2000 2040 manager.exe 29 PID 2040 wrote to memory of 2000 2040 manager.exe 29 PID 2040 wrote to memory of 2000 2040 manager.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f8595d066ee69e7454b30b718102bbd04122ba8a5bab1e9d5f4532b7a7305a3.exe"C:\Users\Admin\AppData\Local\Temp\1f8595d066ee69e7454b30b718102bbd04122ba8a5bab1e9d5f4532b7a7305a3.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Roaming\ActiveX\manager.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe "C:\Users\Admin\AppData\Local\Temp\1f8595d066ee69e7454b30b718102bbd04122ba8a5bab1e9d5f4532b7a7305a3.exe" ensgJJ2⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\secinit.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe3⤵PID:2000
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5b808bcbb1d9b94a4a71899964255ce0e
SHA1c5e899db34a976f8396cdde8044ebb5ca67a513f
SHA2561f8595d066ee69e7454b30b718102bbd04122ba8a5bab1e9d5f4532b7a7305a3
SHA5126f1c8f6fd0ad1ded7a5ab3e39a45f0ca22bc12100117b3a58f613184069128e7e21b7685262f3647408c6871ea8a5e2a07e53379634f65a45b71552d69620ff9
-
Filesize
40KB
MD5b808bcbb1d9b94a4a71899964255ce0e
SHA1c5e899db34a976f8396cdde8044ebb5ca67a513f
SHA2561f8595d066ee69e7454b30b718102bbd04122ba8a5bab1e9d5f4532b7a7305a3
SHA5126f1c8f6fd0ad1ded7a5ab3e39a45f0ca22bc12100117b3a58f613184069128e7e21b7685262f3647408c6871ea8a5e2a07e53379634f65a45b71552d69620ff9
-
Filesize
40KB
MD5b808bcbb1d9b94a4a71899964255ce0e
SHA1c5e899db34a976f8396cdde8044ebb5ca67a513f
SHA2561f8595d066ee69e7454b30b718102bbd04122ba8a5bab1e9d5f4532b7a7305a3
SHA5126f1c8f6fd0ad1ded7a5ab3e39a45f0ca22bc12100117b3a58f613184069128e7e21b7685262f3647408c6871ea8a5e2a07e53379634f65a45b71552d69620ff9
-
Filesize
40KB
MD5b808bcbb1d9b94a4a71899964255ce0e
SHA1c5e899db34a976f8396cdde8044ebb5ca67a513f
SHA2561f8595d066ee69e7454b30b718102bbd04122ba8a5bab1e9d5f4532b7a7305a3
SHA5126f1c8f6fd0ad1ded7a5ab3e39a45f0ca22bc12100117b3a58f613184069128e7e21b7685262f3647408c6871ea8a5e2a07e53379634f65a45b71552d69620ff9