Analysis
-
max time kernel
92s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 02:51
Behavioral task
behavioral1
Sample
b73e52768067d97464a6991027693246fad1afb144cbf9c9e66ffc840cc8542e.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
b73e52768067d97464a6991027693246fad1afb144cbf9c9e66ffc840cc8542e.exe
Resource
win10v2004-20220414-en
General
-
Target
b73e52768067d97464a6991027693246fad1afb144cbf9c9e66ffc840cc8542e.exe
-
Size
31KB
-
MD5
d91559ae45b8f9bc903d27703211b119
-
SHA1
f1b02bf6d06cfba37bfea3a5fdc0664cd7b8b91a
-
SHA256
b73e52768067d97464a6991027693246fad1afb144cbf9c9e66ffc840cc8542e
-
SHA512
3b048d58c7024a7d0ca78b0ffc2ec066bb4712082f8f33fd1aa853fc0ba37d207825be8517e57f548852c6bc2681a16196f7ddfd0dd792d2cb69a21afaa564af
Malware Config
Extracted
buer
https://java-stat.com/
https://installerr.pw/
eqqmp7,,g^s^*pq^q+`lj,
eqqmp7,,fkpq^iiboo+mt,
Signatures
-
resource yara_rule behavioral2/files/0x0006000000022e36-131.dat buer behavioral2/files/0x0006000000022e36-132.dat buer behavioral2/memory/4112-133-0x0000000000000000-mapping.dmp buer behavioral2/memory/4112-134-0x0000000000510000-0x000000000051B000-memory.dmp buer behavioral2/memory/4112-135-0x0000000000510000-0x000000000051B000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 1656 manager.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce secinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ActiveX Component = "C:\\Users\\Admin\\AppData\\Roaming\\ActiveX\\manager.exeĀ" secinit.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce manager.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ActiveX Component = "C:\\Users\\Admin\\AppData\\Roaming\\ActiveX\\manager.exeĀ" manager.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4112 secinit.exe 4112 secinit.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4812 wrote to memory of 1656 4812 b73e52768067d97464a6991027693246fad1afb144cbf9c9e66ffc840cc8542e.exe 81 PID 4812 wrote to memory of 1656 4812 b73e52768067d97464a6991027693246fad1afb144cbf9c9e66ffc840cc8542e.exe 81 PID 4812 wrote to memory of 1656 4812 b73e52768067d97464a6991027693246fad1afb144cbf9c9e66ffc840cc8542e.exe 81 PID 1656 wrote to memory of 4112 1656 manager.exe 82 PID 1656 wrote to memory of 4112 1656 manager.exe 82 PID 1656 wrote to memory of 4112 1656 manager.exe 82 PID 1656 wrote to memory of 4112 1656 manager.exe 82 PID 1656 wrote to memory of 4112 1656 manager.exe 82 PID 1656 wrote to memory of 4112 1656 manager.exe 82 PID 1656 wrote to memory of 4112 1656 manager.exe 82 PID 1656 wrote to memory of 4112 1656 manager.exe 82 PID 1656 wrote to memory of 4112 1656 manager.exe 82 PID 1656 wrote to memory of 4112 1656 manager.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\b73e52768067d97464a6991027693246fad1afb144cbf9c9e66ffc840cc8542e.exe"C:\Users\Admin\AppData\Local\Temp\b73e52768067d97464a6991027693246fad1afb144cbf9c9e66ffc840cc8542e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Roaming\ActiveX\manager.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe "C:\Users\Admin\AppData\Local\Temp\b73e52768067d97464a6991027693246fad1afb144cbf9c9e66ffc840cc8542e.exe" ensgJJ2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\secinit.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4112
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5d91559ae45b8f9bc903d27703211b119
SHA1f1b02bf6d06cfba37bfea3a5fdc0664cd7b8b91a
SHA256b73e52768067d97464a6991027693246fad1afb144cbf9c9e66ffc840cc8542e
SHA5123b048d58c7024a7d0ca78b0ffc2ec066bb4712082f8f33fd1aa853fc0ba37d207825be8517e57f548852c6bc2681a16196f7ddfd0dd792d2cb69a21afaa564af
-
Filesize
31KB
MD5d91559ae45b8f9bc903d27703211b119
SHA1f1b02bf6d06cfba37bfea3a5fdc0664cd7b8b91a
SHA256b73e52768067d97464a6991027693246fad1afb144cbf9c9e66ffc840cc8542e
SHA5123b048d58c7024a7d0ca78b0ffc2ec066bb4712082f8f33fd1aa853fc0ba37d207825be8517e57f548852c6bc2681a16196f7ddfd0dd792d2cb69a21afaa564af