Analysis

  • max time kernel
    152s
  • max time network
    189s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    12-07-2022 08:50

General

  • Target

    4bc5903e3f847e2c0944215a52168fb4e7db034eb5724e2840b3396029cdfb0e.exe

  • Size

    165KB

  • MD5

    567cb2370a3c5521b1c343cce23126ac

  • SHA1

    8fff0c1f83a78165d15711dc9dc6746c10299edf

  • SHA256

    4bc5903e3f847e2c0944215a52168fb4e7db034eb5724e2840b3396029cdfb0e

  • SHA512

    fed721ecf3d5f68e5cfe79466bf02ed8d0e4830cac60efee1af0ba8eba84f25651f041391aec37dfc6e84e454b56f4167d84c3df425e9441433be7d3b3a0c94b

Score
10/10

Malware Config

Extracted

Family

buer

C2

frrn8--_tgp_qsnnmpr,gldm86.6.-

cook5**\qdm\npkkjmo)diaj53+3+*

Signatures

  • Buer

    Buer is a new modular loader first seen in August 2019.

  • Buer Loader 4 IoCs

    Detects Buer loader in memory or disk.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4bc5903e3f847e2c0944215a52168fb4e7db034eb5724e2840b3396029cdfb0e.exe
    "C:\Users\Admin\AppData\Local\Temp\4bc5903e3f847e2c0944215a52168fb4e7db034eb5724e2840b3396029cdfb0e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Users\Admin\AppData\Roaming\ActiveX\manager.exe
      C:\Users\Admin\AppData\Roaming\ActiveX\manager.exe "C:\Users\Admin\AppData\Local\Temp\4bc5903e3f847e2c0944215a52168fb4e7db034eb5724e2840b3396029cdfb0e.exe" ensgJJ
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4544
      • C:\Windows\SysWOW64\secinit.exe
        C:\Users\Admin\AppData\Roaming\ActiveX\manager.exe
        3⤵
          PID:4092
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 268
            4⤵
            • Program crash
            PID:236
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 276
            4⤵
            • Program crash
            PID:2020
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1636 -s 436
        2⤵
        • Program crash
        PID:2284
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1636 -ip 1636
      1⤵
        PID:948
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4092 -ip 4092
        1⤵
          PID:460
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4092 -ip 4092
          1⤵
            PID:900

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\ActiveX\manager.exe

            Filesize

            165KB

            MD5

            567cb2370a3c5521b1c343cce23126ac

            SHA1

            8fff0c1f83a78165d15711dc9dc6746c10299edf

            SHA256

            4bc5903e3f847e2c0944215a52168fb4e7db034eb5724e2840b3396029cdfb0e

            SHA512

            fed721ecf3d5f68e5cfe79466bf02ed8d0e4830cac60efee1af0ba8eba84f25651f041391aec37dfc6e84e454b56f4167d84c3df425e9441433be7d3b3a0c94b

          • C:\Users\Admin\AppData\Roaming\ActiveX\manager.exe

            Filesize

            165KB

            MD5

            567cb2370a3c5521b1c343cce23126ac

            SHA1

            8fff0c1f83a78165d15711dc9dc6746c10299edf

            SHA256

            4bc5903e3f847e2c0944215a52168fb4e7db034eb5724e2840b3396029cdfb0e

            SHA512

            fed721ecf3d5f68e5cfe79466bf02ed8d0e4830cac60efee1af0ba8eba84f25651f041391aec37dfc6e84e454b56f4167d84c3df425e9441433be7d3b3a0c94b

          • memory/1636-131-0x0000000000736000-0x000000000073D000-memory.dmp

            Filesize

            28KB

          • memory/1636-132-0x0000000000690000-0x0000000000699000-memory.dmp

            Filesize

            36KB

          • memory/1636-130-0x0000000000736000-0x000000000073D000-memory.dmp

            Filesize

            28KB

          • memory/1636-135-0x0000000040000000-0x0000000041000000-memory.dmp

            Filesize

            16.0MB

          • memory/1636-137-0x0000000000736000-0x000000000073D000-memory.dmp

            Filesize

            28KB

          • memory/1636-138-0x0000000040000000-0x0000000041000000-memory.dmp

            Filesize

            16.0MB

          • memory/4092-143-0x0000000000600000-0x0000000001600000-memory.dmp

            Filesize

            16.0MB

          • memory/4544-141-0x0000000000695000-0x000000000069C000-memory.dmp

            Filesize

            28KB

          • memory/4544-142-0x0000000040000000-0x0000000041000000-memory.dmp

            Filesize

            16.0MB

          • memory/4544-139-0x0000000000695000-0x000000000069C000-memory.dmp

            Filesize

            28KB