Analysis
-
max time kernel
181s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
24-06-2022 22:39
Static task
static1
Behavioral task
behavioral1
Sample
5c7f5813142029aa1a1326ebef5b7664ab93e0c6bb40cbb40bf9146556a783f3.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
5c7f5813142029aa1a1326ebef5b7664ab93e0c6bb40cbb40bf9146556a783f3.exe
Resource
win10v2004-20220414-en
General
-
Target
5c7f5813142029aa1a1326ebef5b7664ab93e0c6bb40cbb40bf9146556a783f3.exe
-
Size
232KB
-
MD5
f267d07c82912e0222666aa2cdc4cbee
-
SHA1
630f7d9cbbb0af1a0d90502bc4be4dbc32b458de
-
SHA256
5c7f5813142029aa1a1326ebef5b7664ab93e0c6bb40cbb40bf9146556a783f3
-
SHA512
1ccfb880532191238f8a1da2448b83ba7128868431b65909bbc7ebfc29a87ab6bc1060ac56b736d769edb8d703b655f9d5fb13fd18bbc1257dfaba0a8d8bdc42
Malware Config
Extracted
buer
http://45.12.32.252:8080/
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4092-132-0x0000000002130000-0x0000000002139000-memory.dmp buer behavioral2/memory/4092-136-0x0000000040000000-0x000000004318E000-memory.dmp buer behavioral2/memory/4984-140-0x0000000040000000-0x000000004318E000-memory.dmp buer behavioral2/memory/4092-141-0x0000000040000000-0x000000004318E000-memory.dmp buer -
Executes dropped EXE 1 IoCs
Processes:
manager.exepid process 4984 manager.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
manager.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce manager.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ActiveX Component = "C:\\Users\\Admin\\AppData\\Roaming\\ActiveX\\manager.exe" manager.exe -
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4388 4092 WerFault.exe 5c7f5813142029aa1a1326ebef5b7664ab93e0c6bb40cbb40bf9146556a783f3.exe 3148 548 WerFault.exe secinit.exe 920 548 WerFault.exe secinit.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
manager.exepid process 4984 manager.exe 4984 manager.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
5c7f5813142029aa1a1326ebef5b7664ab93e0c6bb40cbb40bf9146556a783f3.exemanager.exedescription pid process target process PID 4092 wrote to memory of 4984 4092 5c7f5813142029aa1a1326ebef5b7664ab93e0c6bb40cbb40bf9146556a783f3.exe manager.exe PID 4092 wrote to memory of 4984 4092 5c7f5813142029aa1a1326ebef5b7664ab93e0c6bb40cbb40bf9146556a783f3.exe manager.exe PID 4092 wrote to memory of 4984 4092 5c7f5813142029aa1a1326ebef5b7664ab93e0c6bb40cbb40bf9146556a783f3.exe manager.exe PID 4984 wrote to memory of 548 4984 manager.exe secinit.exe PID 4984 wrote to memory of 548 4984 manager.exe secinit.exe PID 4984 wrote to memory of 548 4984 manager.exe secinit.exe PID 4984 wrote to memory of 548 4984 manager.exe secinit.exe PID 4984 wrote to memory of 548 4984 manager.exe secinit.exe PID 4984 wrote to memory of 548 4984 manager.exe secinit.exe PID 4984 wrote to memory of 548 4984 manager.exe secinit.exe PID 4984 wrote to memory of 548 4984 manager.exe secinit.exe PID 4984 wrote to memory of 548 4984 manager.exe secinit.exe PID 4984 wrote to memory of 548 4984 manager.exe secinit.exe PID 4984 wrote to memory of 548 4984 manager.exe secinit.exe PID 4984 wrote to memory of 548 4984 manager.exe secinit.exe PID 4984 wrote to memory of 548 4984 manager.exe secinit.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c7f5813142029aa1a1326ebef5b7664ab93e0c6bb40cbb40bf9146556a783f3.exe"C:\Users\Admin\AppData\Local\Temp\5c7f5813142029aa1a1326ebef5b7664ab93e0c6bb40cbb40bf9146556a783f3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\AppData\Roaming\ActiveX\manager.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe "C:\Users\Admin\AppData\Local\Temp\5c7f5813142029aa1a1326ebef5b7664ab93e0c6bb40cbb40bf9146556a783f3.exe" ensgJJ2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\secinit.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe3⤵PID:548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 548 -s 2724⤵
- Program crash
PID:3148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 548 -s 2804⤵
- Program crash
PID:920
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 4362⤵
- Program crash
PID:4388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4092 -ip 40921⤵PID:4352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 548 -ip 5481⤵PID:3120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 548 -ip 5481⤵PID:4168
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD5f267d07c82912e0222666aa2cdc4cbee
SHA1630f7d9cbbb0af1a0d90502bc4be4dbc32b458de
SHA2565c7f5813142029aa1a1326ebef5b7664ab93e0c6bb40cbb40bf9146556a783f3
SHA5121ccfb880532191238f8a1da2448b83ba7128868431b65909bbc7ebfc29a87ab6bc1060ac56b736d769edb8d703b655f9d5fb13fd18bbc1257dfaba0a8d8bdc42
-
Filesize
232KB
MD5f267d07c82912e0222666aa2cdc4cbee
SHA1630f7d9cbbb0af1a0d90502bc4be4dbc32b458de
SHA2565c7f5813142029aa1a1326ebef5b7664ab93e0c6bb40cbb40bf9146556a783f3
SHA5121ccfb880532191238f8a1da2448b83ba7128868431b65909bbc7ebfc29a87ab6bc1060ac56b736d769edb8d703b655f9d5fb13fd18bbc1257dfaba0a8d8bdc42