Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    07-07-2022 17:57

General

  • Target

    44dc7a78801f705233f20d4b37c0e8f72805a86418ba3fe786ec0b14a481cf07.exe

  • Size

    276KB

  • MD5

    f112db5fe30ce25faac045d2eb5b9e14

  • SHA1

    346fa76565cb15beef5306466ad99be143f5a76f

  • SHA256

    44dc7a78801f705233f20d4b37c0e8f72805a86418ba3fe786ec0b14a481cf07

  • SHA512

    81e8b5f313b5ca4e4696ccb33a3381c24e57f2ce6700767c7e81db5579239d096ba24082cd429610eb6c91ad5cc3c4d9a786b6cd2178f0f8c25b1179efe9412f

Score
10/10

Malware Config

Extracted

Family

buer

C2

http://koralak.hk/

Signatures

  • Buer

    Buer is a new modular loader first seen in August 2019.

  • Buer Loader 6 IoCs

    Detects Buer loader in memory or disk.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\44dc7a78801f705233f20d4b37c0e8f72805a86418ba3fe786ec0b14a481cf07.exe
    "C:\Users\Admin\AppData\Local\Temp\44dc7a78801f705233f20d4b37c0e8f72805a86418ba3fe786ec0b14a481cf07.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4376
    • C:\Users\Admin\AppData\Roaming\RailSoft\debugger.exe
      C:\Users\Admin\AppData\Roaming\RailSoft\debugger.exe "C:\Users\Admin\AppData\Local\Temp\44dc7a78801f705233f20d4b37c0e8f72805a86418ba3fe786ec0b14a481cf07.exe" ensgJJ
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2356
      • C:\Windows\SysWOW64\secinit.exe
        C:\Users\Admin\AppData\Roaming\RailSoft\debugger.exe
        3⤵
          PID:1520
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 272
            4⤵
            • Program crash
            PID:396
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 280
            4⤵
            • Program crash
            PID:5052
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 440
        2⤵
        • Program crash
        PID:3840
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4376 -ip 4376
      1⤵
        PID:3656
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1520 -ip 1520
        1⤵
          PID:1876
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1520 -ip 1520
          1⤵
            PID:1072

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\RailSoft\debugger.exe

            Filesize

            276KB

            MD5

            f112db5fe30ce25faac045d2eb5b9e14

            SHA1

            346fa76565cb15beef5306466ad99be143f5a76f

            SHA256

            44dc7a78801f705233f20d4b37c0e8f72805a86418ba3fe786ec0b14a481cf07

            SHA512

            81e8b5f313b5ca4e4696ccb33a3381c24e57f2ce6700767c7e81db5579239d096ba24082cd429610eb6c91ad5cc3c4d9a786b6cd2178f0f8c25b1179efe9412f

          • C:\Users\Admin\AppData\Roaming\RailSoft\debugger.exe

            Filesize

            276KB

            MD5

            f112db5fe30ce25faac045d2eb5b9e14

            SHA1

            346fa76565cb15beef5306466ad99be143f5a76f

            SHA256

            44dc7a78801f705233f20d4b37c0e8f72805a86418ba3fe786ec0b14a481cf07

            SHA512

            81e8b5f313b5ca4e4696ccb33a3381c24e57f2ce6700767c7e81db5579239d096ba24082cd429610eb6c91ad5cc3c4d9a786b6cd2178f0f8c25b1179efe9412f

          • memory/1520-143-0x0000000000F30000-0x0000000004223000-memory.dmp

            Filesize

            50.9MB

          • memory/2356-138-0x0000000040000000-0x00000000432F3000-memory.dmp

            Filesize

            50.9MB

          • memory/2356-141-0x0000000040000000-0x00000000432F3000-memory.dmp

            Filesize

            50.9MB

          • memory/2356-137-0x000000000044D000-0x0000000000454000-memory.dmp

            Filesize

            28KB

          • memory/4376-133-0x0000000040000000-0x00000000432F3000-memory.dmp

            Filesize

            50.9MB

          • memory/4376-139-0x000000000057D000-0x0000000000584000-memory.dmp

            Filesize

            28KB

          • memory/4376-140-0x0000000040000000-0x00000000432F3000-memory.dmp

            Filesize

            50.9MB

          • memory/4376-130-0x000000000057D000-0x0000000000584000-memory.dmp

            Filesize

            28KB

          • memory/4376-132-0x0000000040000000-0x00000000432F3000-memory.dmp

            Filesize

            50.9MB

          • memory/4376-131-0x0000000000550000-0x0000000000559000-memory.dmp

            Filesize

            36KB