Analysis
-
max time kernel
134s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
24-06-2022 22:39
Static task
static1
Behavioral task
behavioral1
Sample
5c7f5813142029aa1a1326ebef5b7664ab93e0c6bb40cbb40bf9146556a783f3.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
5c7f5813142029aa1a1326ebef5b7664ab93e0c6bb40cbb40bf9146556a783f3.exe
Resource
win10v2004-20220414-en
General
-
Target
5c7f5813142029aa1a1326ebef5b7664ab93e0c6bb40cbb40bf9146556a783f3.exe
-
Size
232KB
-
MD5
f267d07c82912e0222666aa2cdc4cbee
-
SHA1
630f7d9cbbb0af1a0d90502bc4be4dbc32b458de
-
SHA256
5c7f5813142029aa1a1326ebef5b7664ab93e0c6bb40cbb40bf9146556a783f3
-
SHA512
1ccfb880532191238f8a1da2448b83ba7128868431b65909bbc7ebfc29a87ab6bc1060ac56b736d769edb8d703b655f9d5fb13fd18bbc1257dfaba0a8d8bdc42
Malware Config
Extracted
buer
http://45.12.32.252:8080/
Signatures
-
resource yara_rule behavioral1/memory/1972-61-0x0000000000220000-0x0000000000229000-memory.dmp buer behavioral1/memory/1972-62-0x0000000040000000-0x000000004318E000-memory.dmp buer behavioral1/memory/904-70-0x0000000040000000-0x000000004318E000-memory.dmp buer behavioral1/memory/904-84-0x0000000040000000-0x000000004318E000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 904 manager.exe -
Deletes itself 1 IoCs
pid Process 904 manager.exe -
Loads dropped DLL 2 IoCs
pid Process 1972 5c7f5813142029aa1a1326ebef5b7664ab93e0c6bb40cbb40bf9146556a783f3.exe 1972 5c7f5813142029aa1a1326ebef5b7664ab93e0c6bb40cbb40bf9146556a783f3.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ActiveX Component = "C:\\Users\\Admin\\AppData\\Roaming\\ActiveX\\manager.exe" manager.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce manager.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 904 manager.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1972 wrote to memory of 904 1972 5c7f5813142029aa1a1326ebef5b7664ab93e0c6bb40cbb40bf9146556a783f3.exe 27 PID 1972 wrote to memory of 904 1972 5c7f5813142029aa1a1326ebef5b7664ab93e0c6bb40cbb40bf9146556a783f3.exe 27 PID 1972 wrote to memory of 904 1972 5c7f5813142029aa1a1326ebef5b7664ab93e0c6bb40cbb40bf9146556a783f3.exe 27 PID 1972 wrote to memory of 904 1972 5c7f5813142029aa1a1326ebef5b7664ab93e0c6bb40cbb40bf9146556a783f3.exe 27 PID 904 wrote to memory of 1512 904 manager.exe 28 PID 904 wrote to memory of 1512 904 manager.exe 28 PID 904 wrote to memory of 1512 904 manager.exe 28 PID 904 wrote to memory of 1512 904 manager.exe 28 PID 904 wrote to memory of 1512 904 manager.exe 28 PID 904 wrote to memory of 1512 904 manager.exe 28 PID 904 wrote to memory of 1512 904 manager.exe 28 PID 904 wrote to memory of 1512 904 manager.exe 28 PID 904 wrote to memory of 1512 904 manager.exe 28 PID 904 wrote to memory of 1512 904 manager.exe 28 PID 904 wrote to memory of 1512 904 manager.exe 28 PID 904 wrote to memory of 1512 904 manager.exe 28 PID 904 wrote to memory of 1512 904 manager.exe 28 PID 904 wrote to memory of 1512 904 manager.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c7f5813142029aa1a1326ebef5b7664ab93e0c6bb40cbb40bf9146556a783f3.exe"C:\Users\Admin\AppData\Local\Temp\5c7f5813142029aa1a1326ebef5b7664ab93e0c6bb40cbb40bf9146556a783f3.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Roaming\ActiveX\manager.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe "C:\Users\Admin\AppData\Local\Temp\5c7f5813142029aa1a1326ebef5b7664ab93e0c6bb40cbb40bf9146556a783f3.exe" ensgJJ2⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\secinit.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe3⤵PID:1512
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD5f267d07c82912e0222666aa2cdc4cbee
SHA1630f7d9cbbb0af1a0d90502bc4be4dbc32b458de
SHA2565c7f5813142029aa1a1326ebef5b7664ab93e0c6bb40cbb40bf9146556a783f3
SHA5121ccfb880532191238f8a1da2448b83ba7128868431b65909bbc7ebfc29a87ab6bc1060ac56b736d769edb8d703b655f9d5fb13fd18bbc1257dfaba0a8d8bdc42
-
Filesize
232KB
MD5f267d07c82912e0222666aa2cdc4cbee
SHA1630f7d9cbbb0af1a0d90502bc4be4dbc32b458de
SHA2565c7f5813142029aa1a1326ebef5b7664ab93e0c6bb40cbb40bf9146556a783f3
SHA5121ccfb880532191238f8a1da2448b83ba7128868431b65909bbc7ebfc29a87ab6bc1060ac56b736d769edb8d703b655f9d5fb13fd18bbc1257dfaba0a8d8bdc42
-
Filesize
232KB
MD5f267d07c82912e0222666aa2cdc4cbee
SHA1630f7d9cbbb0af1a0d90502bc4be4dbc32b458de
SHA2565c7f5813142029aa1a1326ebef5b7664ab93e0c6bb40cbb40bf9146556a783f3
SHA5121ccfb880532191238f8a1da2448b83ba7128868431b65909bbc7ebfc29a87ab6bc1060ac56b736d769edb8d703b655f9d5fb13fd18bbc1257dfaba0a8d8bdc42
-
Filesize
232KB
MD5f267d07c82912e0222666aa2cdc4cbee
SHA1630f7d9cbbb0af1a0d90502bc4be4dbc32b458de
SHA2565c7f5813142029aa1a1326ebef5b7664ab93e0c6bb40cbb40bf9146556a783f3
SHA5121ccfb880532191238f8a1da2448b83ba7128868431b65909bbc7ebfc29a87ab6bc1060ac56b736d769edb8d703b655f9d5fb13fd18bbc1257dfaba0a8d8bdc42