Analysis
-
max time kernel
6s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 11:18
Behavioral task
behavioral1
Sample
874645b953560f0016f252f49f008b125d29ee1db139a8b2603d4f63eb5f5d43.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
874645b953560f0016f252f49f008b125d29ee1db139a8b2603d4f63eb5f5d43.exe
Resource
win10v2004-20220414-en
General
-
Target
874645b953560f0016f252f49f008b125d29ee1db139a8b2603d4f63eb5f5d43.exe
-
Size
31KB
-
MD5
f718a59cfa511acd0487c15785410075
-
SHA1
71920c16526ef5cf41a35d3dbc4d17a6766f61b2
-
SHA256
874645b953560f0016f252f49f008b125d29ee1db139a8b2603d4f63eb5f5d43
-
SHA512
a6c995c6ecb251a7159af13bcc76d4beb0e10e166177eb9b42ba547d2b68c7cbaffec7a0a00ad2a1744a366848151582b043fb8ddba53aca00a768f5b4e3968f
Malware Config
Extracted
buer
http://avirasupport.info:8080/
eqqm7,,^sfo^prmmloq+fkcl75-5-,
Signatures
-
resource yara_rule behavioral1/files/0x000a0000000122d4-55.dat buer behavioral1/files/0x000a0000000122d4-56.dat buer behavioral1/files/0x000a0000000122d4-58.dat buer behavioral1/files/0x000a0000000122d4-60.dat buer behavioral1/memory/1524-69-0x0000000000000000-mapping.dmp buer behavioral1/memory/1524-66-0x0000000000080000-0x000000000008B000-memory.dmp buer behavioral1/memory/1524-65-0x0000000000080000-0x000000000008B000-memory.dmp buer behavioral1/memory/1524-64-0x0000000000080000-0x000000000008B000-memory.dmp buer behavioral1/memory/1524-71-0x0000000000080000-0x000000000008B000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 700 manager.exe -
Deletes itself 1 IoCs
pid Process 700 manager.exe -
Loads dropped DLL 2 IoCs
pid Process 1108 874645b953560f0016f252f49f008b125d29ee1db139a8b2603d4f63eb5f5d43.exe 1108 874645b953560f0016f252f49f008b125d29ee1db139a8b2603d4f63eb5f5d43.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce manager.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ActiveX Component = "C:\\Users\\Admin\\AppData\\Roaming\\ActiveX\\manager.exe" manager.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce secinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ActiveX Component = "C:\\Users\\Admin\\AppData\\Roaming\\ActiveX\\manager.exe" secinit.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1524 secinit.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1108 wrote to memory of 700 1108 874645b953560f0016f252f49f008b125d29ee1db139a8b2603d4f63eb5f5d43.exe 28 PID 1108 wrote to memory of 700 1108 874645b953560f0016f252f49f008b125d29ee1db139a8b2603d4f63eb5f5d43.exe 28 PID 1108 wrote to memory of 700 1108 874645b953560f0016f252f49f008b125d29ee1db139a8b2603d4f63eb5f5d43.exe 28 PID 1108 wrote to memory of 700 1108 874645b953560f0016f252f49f008b125d29ee1db139a8b2603d4f63eb5f5d43.exe 28 PID 700 wrote to memory of 1524 700 manager.exe 29 PID 700 wrote to memory of 1524 700 manager.exe 29 PID 700 wrote to memory of 1524 700 manager.exe 29 PID 700 wrote to memory of 1524 700 manager.exe 29 PID 700 wrote to memory of 1524 700 manager.exe 29 PID 700 wrote to memory of 1524 700 manager.exe 29 PID 700 wrote to memory of 1524 700 manager.exe 29 PID 700 wrote to memory of 1524 700 manager.exe 29 PID 700 wrote to memory of 1524 700 manager.exe 29 PID 700 wrote to memory of 1524 700 manager.exe 29 PID 700 wrote to memory of 1524 700 manager.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\874645b953560f0016f252f49f008b125d29ee1db139a8b2603d4f63eb5f5d43.exe"C:\Users\Admin\AppData\Local\Temp\874645b953560f0016f252f49f008b125d29ee1db139a8b2603d4f63eb5f5d43.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Roaming\ActiveX\manager.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe "C:\Users\Admin\AppData\Local\Temp\874645b953560f0016f252f49f008b125d29ee1db139a8b2603d4f63eb5f5d43.exe" ensgJJ2⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\SysWOW64\secinit.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1524
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5f718a59cfa511acd0487c15785410075
SHA171920c16526ef5cf41a35d3dbc4d17a6766f61b2
SHA256874645b953560f0016f252f49f008b125d29ee1db139a8b2603d4f63eb5f5d43
SHA512a6c995c6ecb251a7159af13bcc76d4beb0e10e166177eb9b42ba547d2b68c7cbaffec7a0a00ad2a1744a366848151582b043fb8ddba53aca00a768f5b4e3968f
-
Filesize
31KB
MD5f718a59cfa511acd0487c15785410075
SHA171920c16526ef5cf41a35d3dbc4d17a6766f61b2
SHA256874645b953560f0016f252f49f008b125d29ee1db139a8b2603d4f63eb5f5d43
SHA512a6c995c6ecb251a7159af13bcc76d4beb0e10e166177eb9b42ba547d2b68c7cbaffec7a0a00ad2a1744a366848151582b043fb8ddba53aca00a768f5b4e3968f
-
Filesize
31KB
MD5f718a59cfa511acd0487c15785410075
SHA171920c16526ef5cf41a35d3dbc4d17a6766f61b2
SHA256874645b953560f0016f252f49f008b125d29ee1db139a8b2603d4f63eb5f5d43
SHA512a6c995c6ecb251a7159af13bcc76d4beb0e10e166177eb9b42ba547d2b68c7cbaffec7a0a00ad2a1744a366848151582b043fb8ddba53aca00a768f5b4e3968f
-
Filesize
31KB
MD5f718a59cfa511acd0487c15785410075
SHA171920c16526ef5cf41a35d3dbc4d17a6766f61b2
SHA256874645b953560f0016f252f49f008b125d29ee1db139a8b2603d4f63eb5f5d43
SHA512a6c995c6ecb251a7159af13bcc76d4beb0e10e166177eb9b42ba547d2b68c7cbaffec7a0a00ad2a1744a366848151582b043fb8ddba53aca00a768f5b4e3968f