Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-07-2022 17:57
Static task
static1
Behavioral task
behavioral1
Sample
44dc7a78801f705233f20d4b37c0e8f72805a86418ba3fe786ec0b14a481cf07.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
44dc7a78801f705233f20d4b37c0e8f72805a86418ba3fe786ec0b14a481cf07.exe
Resource
win10v2004-20220414-en
General
-
Target
44dc7a78801f705233f20d4b37c0e8f72805a86418ba3fe786ec0b14a481cf07.exe
-
Size
276KB
-
MD5
f112db5fe30ce25faac045d2eb5b9e14
-
SHA1
346fa76565cb15beef5306466ad99be143f5a76f
-
SHA256
44dc7a78801f705233f20d4b37c0e8f72805a86418ba3fe786ec0b14a481cf07
-
SHA512
81e8b5f313b5ca4e4696ccb33a3381c24e57f2ce6700767c7e81db5579239d096ba24082cd429610eb6c91ad5cc3c4d9a786b6cd2178f0f8c25b1179efe9412f
Malware Config
Extracted
buer
http://koralak.hk/
Signatures
-
resource yara_rule behavioral2/memory/4376-131-0x0000000000550000-0x0000000000559000-memory.dmp buer behavioral2/memory/4376-132-0x0000000040000000-0x00000000432F3000-memory.dmp buer behavioral2/memory/4376-133-0x0000000040000000-0x00000000432F3000-memory.dmp buer behavioral2/memory/2356-138-0x0000000040000000-0x00000000432F3000-memory.dmp buer behavioral2/memory/4376-140-0x0000000040000000-0x00000000432F3000-memory.dmp buer behavioral2/memory/2356-141-0x0000000040000000-0x00000000432F3000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 2356 debugger.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 44dc7a78801f705233f20d4b37c0e8f72805a86418ba3fe786ec0b14a481cf07.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\RailSoftComany = "C:\\Users\\Admin\\AppData\\Roaming\\RailSoft\\debugger.exe" 44dc7a78801f705233f20d4b37c0e8f72805a86418ba3fe786ec0b14a481cf07.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 3840 4376 WerFault.exe 82 396 1520 WerFault.exe 94 5052 1520 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2356 debugger.exe 2356 debugger.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4376 wrote to memory of 2356 4376 44dc7a78801f705233f20d4b37c0e8f72805a86418ba3fe786ec0b14a481cf07.exe 90 PID 4376 wrote to memory of 2356 4376 44dc7a78801f705233f20d4b37c0e8f72805a86418ba3fe786ec0b14a481cf07.exe 90 PID 4376 wrote to memory of 2356 4376 44dc7a78801f705233f20d4b37c0e8f72805a86418ba3fe786ec0b14a481cf07.exe 90 PID 2356 wrote to memory of 1520 2356 debugger.exe 94 PID 2356 wrote to memory of 1520 2356 debugger.exe 94 PID 2356 wrote to memory of 1520 2356 debugger.exe 94 PID 2356 wrote to memory of 1520 2356 debugger.exe 94 PID 2356 wrote to memory of 1520 2356 debugger.exe 94 PID 2356 wrote to memory of 1520 2356 debugger.exe 94 PID 2356 wrote to memory of 1520 2356 debugger.exe 94 PID 2356 wrote to memory of 1520 2356 debugger.exe 94 PID 2356 wrote to memory of 1520 2356 debugger.exe 94 PID 2356 wrote to memory of 1520 2356 debugger.exe 94 PID 2356 wrote to memory of 1520 2356 debugger.exe 94 PID 2356 wrote to memory of 1520 2356 debugger.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\44dc7a78801f705233f20d4b37c0e8f72805a86418ba3fe786ec0b14a481cf07.exe"C:\Users\Admin\AppData\Local\Temp\44dc7a78801f705233f20d4b37c0e8f72805a86418ba3fe786ec0b14a481cf07.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Roaming\RailSoft\debugger.exeC:\Users\Admin\AppData\Roaming\RailSoft\debugger.exe "C:\Users\Admin\AppData\Local\Temp\44dc7a78801f705233f20d4b37c0e8f72805a86418ba3fe786ec0b14a481cf07.exe" ensgJJ2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\secinit.exeC:\Users\Admin\AppData\Roaming\RailSoft\debugger.exe3⤵PID:1520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 2724⤵
- Program crash
PID:396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 2804⤵
- Program crash
PID:5052
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 4402⤵
- Program crash
PID:3840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4376 -ip 43761⤵PID:3656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1520 -ip 15201⤵PID:1876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1520 -ip 15201⤵PID:1072
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276KB
MD5f112db5fe30ce25faac045d2eb5b9e14
SHA1346fa76565cb15beef5306466ad99be143f5a76f
SHA25644dc7a78801f705233f20d4b37c0e8f72805a86418ba3fe786ec0b14a481cf07
SHA51281e8b5f313b5ca4e4696ccb33a3381c24e57f2ce6700767c7e81db5579239d096ba24082cd429610eb6c91ad5cc3c4d9a786b6cd2178f0f8c25b1179efe9412f
-
Filesize
276KB
MD5f112db5fe30ce25faac045d2eb5b9e14
SHA1346fa76565cb15beef5306466ad99be143f5a76f
SHA25644dc7a78801f705233f20d4b37c0e8f72805a86418ba3fe786ec0b14a481cf07
SHA51281e8b5f313b5ca4e4696ccb33a3381c24e57f2ce6700767c7e81db5579239d096ba24082cd429610eb6c91ad5cc3c4d9a786b6cd2178f0f8c25b1179efe9412f