Analysis
-
max time kernel
133s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 11:18
Behavioral task
behavioral1
Sample
874645b953560f0016f252f49f008b125d29ee1db139a8b2603d4f63eb5f5d43.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
874645b953560f0016f252f49f008b125d29ee1db139a8b2603d4f63eb5f5d43.exe
Resource
win10v2004-20220414-en
General
-
Target
874645b953560f0016f252f49f008b125d29ee1db139a8b2603d4f63eb5f5d43.exe
-
Size
31KB
-
MD5
f718a59cfa511acd0487c15785410075
-
SHA1
71920c16526ef5cf41a35d3dbc4d17a6766f61b2
-
SHA256
874645b953560f0016f252f49f008b125d29ee1db139a8b2603d4f63eb5f5d43
-
SHA512
a6c995c6ecb251a7159af13bcc76d4beb0e10e166177eb9b42ba547d2b68c7cbaffec7a0a00ad2a1744a366848151582b043fb8ddba53aca00a768f5b4e3968f
Malware Config
Extracted
buer
http://avirasupport.info:8080/
eqqm7,,^sfo^prmmloq+fkcl75-5-,
Signatures
-
resource yara_rule behavioral2/files/0x0003000000000731-131.dat buer behavioral2/files/0x0003000000000731-132.dat buer behavioral2/memory/2396-133-0x0000000000000000-mapping.dmp buer behavioral2/memory/2396-134-0x0000000000EF0000-0x0000000000EFB000-memory.dmp buer behavioral2/memory/2396-135-0x0000000000EF0000-0x0000000000EFB000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 332 manager.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce manager.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ActiveX Component = "C:\\Users\\Admin\\AppData\\Roaming\\ActiveX\\manager.exe" manager.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce secinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ActiveX Component = "C:\\Users\\Admin\\AppData\\Roaming\\ActiveX\\manager.exe" secinit.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2396 secinit.exe 2396 secinit.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 940 wrote to memory of 332 940 874645b953560f0016f252f49f008b125d29ee1db139a8b2603d4f63eb5f5d43.exe 79 PID 940 wrote to memory of 332 940 874645b953560f0016f252f49f008b125d29ee1db139a8b2603d4f63eb5f5d43.exe 79 PID 940 wrote to memory of 332 940 874645b953560f0016f252f49f008b125d29ee1db139a8b2603d4f63eb5f5d43.exe 79 PID 332 wrote to memory of 2396 332 manager.exe 80 PID 332 wrote to memory of 2396 332 manager.exe 80 PID 332 wrote to memory of 2396 332 manager.exe 80 PID 332 wrote to memory of 2396 332 manager.exe 80 PID 332 wrote to memory of 2396 332 manager.exe 80 PID 332 wrote to memory of 2396 332 manager.exe 80 PID 332 wrote to memory of 2396 332 manager.exe 80 PID 332 wrote to memory of 2396 332 manager.exe 80 PID 332 wrote to memory of 2396 332 manager.exe 80 PID 332 wrote to memory of 2396 332 manager.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\874645b953560f0016f252f49f008b125d29ee1db139a8b2603d4f63eb5f5d43.exe"C:\Users\Admin\AppData\Local\Temp\874645b953560f0016f252f49f008b125d29ee1db139a8b2603d4f63eb5f5d43.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Roaming\ActiveX\manager.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe "C:\Users\Admin\AppData\Local\Temp\874645b953560f0016f252f49f008b125d29ee1db139a8b2603d4f63eb5f5d43.exe" ensgJJ2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\SysWOW64\secinit.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2396
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5f718a59cfa511acd0487c15785410075
SHA171920c16526ef5cf41a35d3dbc4d17a6766f61b2
SHA256874645b953560f0016f252f49f008b125d29ee1db139a8b2603d4f63eb5f5d43
SHA512a6c995c6ecb251a7159af13bcc76d4beb0e10e166177eb9b42ba547d2b68c7cbaffec7a0a00ad2a1744a366848151582b043fb8ddba53aca00a768f5b4e3968f
-
Filesize
31KB
MD5f718a59cfa511acd0487c15785410075
SHA171920c16526ef5cf41a35d3dbc4d17a6766f61b2
SHA256874645b953560f0016f252f49f008b125d29ee1db139a8b2603d4f63eb5f5d43
SHA512a6c995c6ecb251a7159af13bcc76d4beb0e10e166177eb9b42ba547d2b68c7cbaffec7a0a00ad2a1744a366848151582b043fb8ddba53aca00a768f5b4e3968f