Analysis
-
max time kernel
194s -
max time network
208s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
14-07-2022 04:45
Behavioral task
behavioral1
Sample
47f6ca6bad3812abde610a5d9ee7d830a20cff27d16198626027446eaee513a7.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
47f6ca6bad3812abde610a5d9ee7d830a20cff27d16198626027446eaee513a7.exe
Resource
win10v2004-20220414-en
General
-
Target
47f6ca6bad3812abde610a5d9ee7d830a20cff27d16198626027446eaee513a7.exe
-
Size
160KB
-
MD5
d8e4d911bd32bc0cec654270a195a86c
-
SHA1
9f262bd7f6ca033eb3f03c6ce1e82d98005f28ad
-
SHA256
47f6ca6bad3812abde610a5d9ee7d830a20cff27d16198626027446eaee513a7
-
SHA512
f61bb004ac75ad3727822782547b0d183c9dc2b68215da867d9ce96257e29beadabc621a3c51f8be7e9538a3347b2723dcfcf9163826d18122525c098be3e61b
Malware Config
Extracted
buer
frrn8--ddjm_b./,rmn-
frrn8--ddjm_b.0,rmn-
Signatures
-
suricata: ET MALWARE Buer Loader Update Request
suricata: ET MALWARE Buer Loader Update Request
-
resource yara_rule behavioral2/files/0x0008000000023146-131.dat buer behavioral2/files/0x0008000000023146-132.dat buer behavioral2/memory/4544-133-0x0000000000000000-mapping.dmp buer behavioral2/memory/4544-134-0x00000000003D0000-0x00000000003FB000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 4216 manager.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce manager.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ActiveX Component = "C:\\Users\\Admin\\AppData\\Roaming\\ActiveX\\manager.exe" manager.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce secinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ActiveX Component = "C:\\Users\\Admin\\AppData\\Roaming\\ActiveX\\manager.exe" secinit.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4544 secinit.exe 4544 secinit.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2632 wrote to memory of 4216 2632 47f6ca6bad3812abde610a5d9ee7d830a20cff27d16198626027446eaee513a7.exe 79 PID 2632 wrote to memory of 4216 2632 47f6ca6bad3812abde610a5d9ee7d830a20cff27d16198626027446eaee513a7.exe 79 PID 2632 wrote to memory of 4216 2632 47f6ca6bad3812abde610a5d9ee7d830a20cff27d16198626027446eaee513a7.exe 79 PID 4216 wrote to memory of 4544 4216 manager.exe 80 PID 4216 wrote to memory of 4544 4216 manager.exe 80 PID 4216 wrote to memory of 4544 4216 manager.exe 80 PID 4216 wrote to memory of 4544 4216 manager.exe 80 PID 4216 wrote to memory of 4544 4216 manager.exe 80 PID 4216 wrote to memory of 4544 4216 manager.exe 80 PID 4216 wrote to memory of 4544 4216 manager.exe 80 PID 4216 wrote to memory of 4544 4216 manager.exe 80 PID 4216 wrote to memory of 4544 4216 manager.exe 80 PID 4216 wrote to memory of 4544 4216 manager.exe 80 PID 4216 wrote to memory of 4544 4216 manager.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\47f6ca6bad3812abde610a5d9ee7d830a20cff27d16198626027446eaee513a7.exe"C:\Users\Admin\AppData\Local\Temp\47f6ca6bad3812abde610a5d9ee7d830a20cff27d16198626027446eaee513a7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Roaming\ActiveX\manager.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe "C:\Users\Admin\AppData\Local\Temp\47f6ca6bad3812abde610a5d9ee7d830a20cff27d16198626027446eaee513a7.exe" ensgJJ2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Windows\SysWOW64\secinit.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4544
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD5d8e4d911bd32bc0cec654270a195a86c
SHA19f262bd7f6ca033eb3f03c6ce1e82d98005f28ad
SHA25647f6ca6bad3812abde610a5d9ee7d830a20cff27d16198626027446eaee513a7
SHA512f61bb004ac75ad3727822782547b0d183c9dc2b68215da867d9ce96257e29beadabc621a3c51f8be7e9538a3347b2723dcfcf9163826d18122525c098be3e61b
-
Filesize
160KB
MD5d8e4d911bd32bc0cec654270a195a86c
SHA19f262bd7f6ca033eb3f03c6ce1e82d98005f28ad
SHA25647f6ca6bad3812abde610a5d9ee7d830a20cff27d16198626027446eaee513a7
SHA512f61bb004ac75ad3727822782547b0d183c9dc2b68215da867d9ce96257e29beadabc621a3c51f8be7e9538a3347b2723dcfcf9163826d18122525c098be3e61b