Analysis
-
max time kernel
130s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
01-07-2022 04:11
Static task
static1
Behavioral task
behavioral1
Sample
5860aa99f2728d1fe095387575f210cea1ca41a4a1c1d12f276ea7784413c186.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
5860aa99f2728d1fe095387575f210cea1ca41a4a1c1d12f276ea7784413c186.exe
Resource
win10v2004-20220414-en
General
-
Target
5860aa99f2728d1fe095387575f210cea1ca41a4a1c1d12f276ea7784413c186.exe
-
Size
232KB
-
MD5
433d6c179b52282f730f84bdf722f0dc
-
SHA1
9a4aab9d9c9cef5f1ac2c1135e49957e4f85befd
-
SHA256
5860aa99f2728d1fe095387575f210cea1ca41a4a1c1d12f276ea7784413c186
-
SHA512
0194168071a278982fb152fd0c63aa30def25db18edf6784163ba41617fab7fec368f391a40337efdbf305905c8d58c3202edcfd4e290c90509ea6a5f7a6de10
Malware Config
Extracted
buer
http://45.12.32.252:8080/
Signatures
-
resource yara_rule behavioral1/memory/292-61-0x0000000000230000-0x0000000000239000-memory.dmp buer behavioral1/memory/292-62-0x0000000040000000-0x000000004318E000-memory.dmp buer behavioral1/memory/1892-72-0x0000000040000000-0x000000004318E000-memory.dmp buer behavioral1/memory/1892-84-0x0000000040000000-0x000000004318E000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 1892 manager.exe -
Deletes itself 1 IoCs
pid Process 1892 manager.exe -
Loads dropped DLL 2 IoCs
pid Process 292 5860aa99f2728d1fe095387575f210cea1ca41a4a1c1d12f276ea7784413c186.exe 292 5860aa99f2728d1fe095387575f210cea1ca41a4a1c1d12f276ea7784413c186.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce manager.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ActiveX Component = "C:\\Users\\Admin\\AppData\\Roaming\\ActiveX\\manager.exe" manager.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1892 manager.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 292 wrote to memory of 1892 292 5860aa99f2728d1fe095387575f210cea1ca41a4a1c1d12f276ea7784413c186.exe 28 PID 292 wrote to memory of 1892 292 5860aa99f2728d1fe095387575f210cea1ca41a4a1c1d12f276ea7784413c186.exe 28 PID 292 wrote to memory of 1892 292 5860aa99f2728d1fe095387575f210cea1ca41a4a1c1d12f276ea7784413c186.exe 28 PID 292 wrote to memory of 1892 292 5860aa99f2728d1fe095387575f210cea1ca41a4a1c1d12f276ea7784413c186.exe 28 PID 1892 wrote to memory of 1396 1892 manager.exe 29 PID 1892 wrote to memory of 1396 1892 manager.exe 29 PID 1892 wrote to memory of 1396 1892 manager.exe 29 PID 1892 wrote to memory of 1396 1892 manager.exe 29 PID 1892 wrote to memory of 1396 1892 manager.exe 29 PID 1892 wrote to memory of 1396 1892 manager.exe 29 PID 1892 wrote to memory of 1396 1892 manager.exe 29 PID 1892 wrote to memory of 1396 1892 manager.exe 29 PID 1892 wrote to memory of 1396 1892 manager.exe 29 PID 1892 wrote to memory of 1396 1892 manager.exe 29 PID 1892 wrote to memory of 1396 1892 manager.exe 29 PID 1892 wrote to memory of 1396 1892 manager.exe 29 PID 1892 wrote to memory of 1396 1892 manager.exe 29 PID 1892 wrote to memory of 1396 1892 manager.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5860aa99f2728d1fe095387575f210cea1ca41a4a1c1d12f276ea7784413c186.exe"C:\Users\Admin\AppData\Local\Temp\5860aa99f2728d1fe095387575f210cea1ca41a4a1c1d12f276ea7784413c186.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Users\Admin\AppData\Roaming\ActiveX\manager.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe "C:\Users\Admin\AppData\Local\Temp\5860aa99f2728d1fe095387575f210cea1ca41a4a1c1d12f276ea7784413c186.exe" ensgJJ2⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\secinit.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe3⤵PID:1396
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD5433d6c179b52282f730f84bdf722f0dc
SHA19a4aab9d9c9cef5f1ac2c1135e49957e4f85befd
SHA2565860aa99f2728d1fe095387575f210cea1ca41a4a1c1d12f276ea7784413c186
SHA5120194168071a278982fb152fd0c63aa30def25db18edf6784163ba41617fab7fec368f391a40337efdbf305905c8d58c3202edcfd4e290c90509ea6a5f7a6de10
-
Filesize
232KB
MD5433d6c179b52282f730f84bdf722f0dc
SHA19a4aab9d9c9cef5f1ac2c1135e49957e4f85befd
SHA2565860aa99f2728d1fe095387575f210cea1ca41a4a1c1d12f276ea7784413c186
SHA5120194168071a278982fb152fd0c63aa30def25db18edf6784163ba41617fab7fec368f391a40337efdbf305905c8d58c3202edcfd4e290c90509ea6a5f7a6de10
-
Filesize
232KB
MD5433d6c179b52282f730f84bdf722f0dc
SHA19a4aab9d9c9cef5f1ac2c1135e49957e4f85befd
SHA2565860aa99f2728d1fe095387575f210cea1ca41a4a1c1d12f276ea7784413c186
SHA5120194168071a278982fb152fd0c63aa30def25db18edf6784163ba41617fab7fec368f391a40337efdbf305905c8d58c3202edcfd4e290c90509ea6a5f7a6de10
-
Filesize
232KB
MD5433d6c179b52282f730f84bdf722f0dc
SHA19a4aab9d9c9cef5f1ac2c1135e49957e4f85befd
SHA2565860aa99f2728d1fe095387575f210cea1ca41a4a1c1d12f276ea7784413c186
SHA5120194168071a278982fb152fd0c63aa30def25db18edf6784163ba41617fab7fec368f391a40337efdbf305905c8d58c3202edcfd4e290c90509ea6a5f7a6de10