Analysis
-
max time kernel
64s -
max time network
70s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
01-07-2022 05:30
Behavioral task
behavioral1
Sample
8026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
8026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22.exe
Resource
win10v2004-20220414-en
General
-
Target
8026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22.exe
-
Size
31KB
-
MD5
b7eabb9d09f243bcb2c47d411028b07b
-
SHA1
b65366292b2d5d917f6aaee8634e635f4b5308ef
-
SHA256
8026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22
-
SHA512
5285067287e4cdb4f0ee121eaf2fce2ae91d1bec0f7ebfff657dc452493db3c637b54d0cb495590bf92253ffcd4aa9681b015c258717966ef89a9b83859c300f
Malware Config
Extracted
buer
http://looad.top/
http://looad02.top/
Signatures
-
resource yara_rule behavioral1/files/0x000800000001483d-55.dat buer behavioral1/files/0x000800000001483d-56.dat buer behavioral1/files/0x000800000001483d-58.dat buer behavioral1/files/0x000800000001483d-60.dat buer behavioral1/memory/1356-69-0x0000000000000000-mapping.dmp buer behavioral1/memory/1356-66-0x00000000000C0000-0x00000000000CB000-memory.dmp buer behavioral1/memory/1356-65-0x00000000000C0000-0x00000000000CB000-memory.dmp buer behavioral1/memory/1356-64-0x00000000000C0000-0x00000000000CB000-memory.dmp buer behavioral1/memory/1356-71-0x00000000000C0000-0x00000000000CB000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 948 manager.exe -
Deletes itself 1 IoCs
pid Process 948 manager.exe -
Loads dropped DLL 2 IoCs
pid Process 1396 8026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22.exe 1396 8026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ActiveX Component = "C:\\Users\\Admin\\AppData\\Roaming\\ActiveX\\manager.exe" manager.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce secinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ActiveX Component = "C:\\Users\\Admin\\AppData\\Roaming\\ActiveX\\manager.exe" secinit.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce manager.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1356 secinit.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1396 wrote to memory of 948 1396 8026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22.exe 27 PID 1396 wrote to memory of 948 1396 8026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22.exe 27 PID 1396 wrote to memory of 948 1396 8026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22.exe 27 PID 1396 wrote to memory of 948 1396 8026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22.exe 27 PID 948 wrote to memory of 1356 948 manager.exe 28 PID 948 wrote to memory of 1356 948 manager.exe 28 PID 948 wrote to memory of 1356 948 manager.exe 28 PID 948 wrote to memory of 1356 948 manager.exe 28 PID 948 wrote to memory of 1356 948 manager.exe 28 PID 948 wrote to memory of 1356 948 manager.exe 28 PID 948 wrote to memory of 1356 948 manager.exe 28 PID 948 wrote to memory of 1356 948 manager.exe 28 PID 948 wrote to memory of 1356 948 manager.exe 28 PID 948 wrote to memory of 1356 948 manager.exe 28 PID 948 wrote to memory of 1356 948 manager.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22.exe"C:\Users\Admin\AppData\Local\Temp\8026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Roaming\ActiveX\manager.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe "C:\Users\Admin\AppData\Local\Temp\8026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22.exe" ensgJJ2⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\secinit.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1356
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5b7eabb9d09f243bcb2c47d411028b07b
SHA1b65366292b2d5d917f6aaee8634e635f4b5308ef
SHA2568026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22
SHA5125285067287e4cdb4f0ee121eaf2fce2ae91d1bec0f7ebfff657dc452493db3c637b54d0cb495590bf92253ffcd4aa9681b015c258717966ef89a9b83859c300f
-
Filesize
31KB
MD5b7eabb9d09f243bcb2c47d411028b07b
SHA1b65366292b2d5d917f6aaee8634e635f4b5308ef
SHA2568026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22
SHA5125285067287e4cdb4f0ee121eaf2fce2ae91d1bec0f7ebfff657dc452493db3c637b54d0cb495590bf92253ffcd4aa9681b015c258717966ef89a9b83859c300f
-
Filesize
31KB
MD5b7eabb9d09f243bcb2c47d411028b07b
SHA1b65366292b2d5d917f6aaee8634e635f4b5308ef
SHA2568026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22
SHA5125285067287e4cdb4f0ee121eaf2fce2ae91d1bec0f7ebfff657dc452493db3c637b54d0cb495590bf92253ffcd4aa9681b015c258717966ef89a9b83859c300f
-
Filesize
31KB
MD5b7eabb9d09f243bcb2c47d411028b07b
SHA1b65366292b2d5d917f6aaee8634e635f4b5308ef
SHA2568026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22
SHA5125285067287e4cdb4f0ee121eaf2fce2ae91d1bec0f7ebfff657dc452493db3c637b54d0cb495590bf92253ffcd4aa9681b015c258717966ef89a9b83859c300f