Analysis
-
max time kernel
40s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 02:51
Behavioral task
behavioral1
Sample
b73e52768067d97464a6991027693246fad1afb144cbf9c9e66ffc840cc8542e.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
b73e52768067d97464a6991027693246fad1afb144cbf9c9e66ffc840cc8542e.exe
Resource
win10v2004-20220414-en
General
-
Target
b73e52768067d97464a6991027693246fad1afb144cbf9c9e66ffc840cc8542e.exe
-
Size
31KB
-
MD5
d91559ae45b8f9bc903d27703211b119
-
SHA1
f1b02bf6d06cfba37bfea3a5fdc0664cd7b8b91a
-
SHA256
b73e52768067d97464a6991027693246fad1afb144cbf9c9e66ffc840cc8542e
-
SHA512
3b048d58c7024a7d0ca78b0ffc2ec066bb4712082f8f33fd1aa853fc0ba37d207825be8517e57f548852c6bc2681a16196f7ddfd0dd792d2cb69a21afaa564af
Malware Config
Extracted
buer
https://java-stat.com/
https://installerr.pw/
Signatures
-
resource yara_rule behavioral1/files/0x000a0000000122fb-55.dat buer behavioral1/files/0x000a0000000122fb-56.dat buer behavioral1/files/0x000a0000000122fb-58.dat buer behavioral1/files/0x000a0000000122fb-60.dat buer behavioral1/memory/1644-64-0x00000000000C0000-0x00000000000CB000-memory.dmp buer behavioral1/memory/1644-65-0x00000000000C0000-0x00000000000CB000-memory.dmp buer behavioral1/memory/1644-66-0x00000000000C0000-0x00000000000CB000-memory.dmp buer behavioral1/memory/1644-69-0x0000000000000000-mapping.dmp buer behavioral1/memory/1644-71-0x00000000000C0000-0x00000000000CB000-memory.dmp buer behavioral1/memory/1644-72-0x00000000000C0000-0x00000000000CB000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 900 manager.exe -
Deletes itself 1 IoCs
pid Process 900 manager.exe -
Loads dropped DLL 2 IoCs
pid Process 1992 b73e52768067d97464a6991027693246fad1afb144cbf9c9e66ffc840cc8542e.exe 1992 b73e52768067d97464a6991027693246fad1afb144cbf9c9e66ffc840cc8542e.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce manager.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ActiveX Component = "C:\\Users\\Admin\\AppData\\Roaming\\ActiveX\\manager.exe" manager.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce secinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ActiveX Component = "C:\\Users\\Admin\\AppData\\Roaming\\ActiveX\\manager.exe" secinit.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1644 secinit.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1992 wrote to memory of 900 1992 b73e52768067d97464a6991027693246fad1afb144cbf9c9e66ffc840cc8542e.exe 28 PID 1992 wrote to memory of 900 1992 b73e52768067d97464a6991027693246fad1afb144cbf9c9e66ffc840cc8542e.exe 28 PID 1992 wrote to memory of 900 1992 b73e52768067d97464a6991027693246fad1afb144cbf9c9e66ffc840cc8542e.exe 28 PID 1992 wrote to memory of 900 1992 b73e52768067d97464a6991027693246fad1afb144cbf9c9e66ffc840cc8542e.exe 28 PID 900 wrote to memory of 1644 900 manager.exe 29 PID 900 wrote to memory of 1644 900 manager.exe 29 PID 900 wrote to memory of 1644 900 manager.exe 29 PID 900 wrote to memory of 1644 900 manager.exe 29 PID 900 wrote to memory of 1644 900 manager.exe 29 PID 900 wrote to memory of 1644 900 manager.exe 29 PID 900 wrote to memory of 1644 900 manager.exe 29 PID 900 wrote to memory of 1644 900 manager.exe 29 PID 900 wrote to memory of 1644 900 manager.exe 29 PID 900 wrote to memory of 1644 900 manager.exe 29 PID 900 wrote to memory of 1644 900 manager.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b73e52768067d97464a6991027693246fad1afb144cbf9c9e66ffc840cc8542e.exe"C:\Users\Admin\AppData\Local\Temp\b73e52768067d97464a6991027693246fad1afb144cbf9c9e66ffc840cc8542e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Roaming\ActiveX\manager.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe "C:\Users\Admin\AppData\Local\Temp\b73e52768067d97464a6991027693246fad1afb144cbf9c9e66ffc840cc8542e.exe" ensgJJ2⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\SysWOW64\secinit.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1644
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5d91559ae45b8f9bc903d27703211b119
SHA1f1b02bf6d06cfba37bfea3a5fdc0664cd7b8b91a
SHA256b73e52768067d97464a6991027693246fad1afb144cbf9c9e66ffc840cc8542e
SHA5123b048d58c7024a7d0ca78b0ffc2ec066bb4712082f8f33fd1aa853fc0ba37d207825be8517e57f548852c6bc2681a16196f7ddfd0dd792d2cb69a21afaa564af
-
Filesize
31KB
MD5d91559ae45b8f9bc903d27703211b119
SHA1f1b02bf6d06cfba37bfea3a5fdc0664cd7b8b91a
SHA256b73e52768067d97464a6991027693246fad1afb144cbf9c9e66ffc840cc8542e
SHA5123b048d58c7024a7d0ca78b0ffc2ec066bb4712082f8f33fd1aa853fc0ba37d207825be8517e57f548852c6bc2681a16196f7ddfd0dd792d2cb69a21afaa564af
-
Filesize
31KB
MD5d91559ae45b8f9bc903d27703211b119
SHA1f1b02bf6d06cfba37bfea3a5fdc0664cd7b8b91a
SHA256b73e52768067d97464a6991027693246fad1afb144cbf9c9e66ffc840cc8542e
SHA5123b048d58c7024a7d0ca78b0ffc2ec066bb4712082f8f33fd1aa853fc0ba37d207825be8517e57f548852c6bc2681a16196f7ddfd0dd792d2cb69a21afaa564af
-
Filesize
31KB
MD5d91559ae45b8f9bc903d27703211b119
SHA1f1b02bf6d06cfba37bfea3a5fdc0664cd7b8b91a
SHA256b73e52768067d97464a6991027693246fad1afb144cbf9c9e66ffc840cc8542e
SHA5123b048d58c7024a7d0ca78b0ffc2ec066bb4712082f8f33fd1aa853fc0ba37d207825be8517e57f548852c6bc2681a16196f7ddfd0dd792d2cb69a21afaa564af