Analysis
-
max time kernel
48s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
14-07-2022 15:34
Behavioral task
behavioral1
Sample
8026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
8026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22.exe
Resource
win10v2004-20220414-en
General
-
Target
8026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22.exe
-
Size
31KB
-
MD5
b7eabb9d09f243bcb2c47d411028b07b
-
SHA1
b65366292b2d5d917f6aaee8634e635f4b5308ef
-
SHA256
8026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22
-
SHA512
5285067287e4cdb4f0ee121eaf2fce2ae91d1bec0f7ebfff657dc452493db3c637b54d0cb495590bf92253ffcd4aa9681b015c258717966ef89a9b83859c300f
Malware Config
Extracted
buer
http://looad.top/
http://looad02.top/
Signatures
-
resource yara_rule behavioral1/files/0x000b000000012316-55.dat buer behavioral1/files/0x000b000000012316-56.dat buer behavioral1/files/0x000b000000012316-58.dat buer behavioral1/files/0x000b000000012316-60.dat buer behavioral1/memory/2040-69-0x0000000000000000-mapping.dmp buer behavioral1/memory/2040-66-0x0000000000080000-0x000000000008B000-memory.dmp buer behavioral1/memory/2040-65-0x0000000000080000-0x000000000008B000-memory.dmp buer behavioral1/memory/2040-64-0x0000000000080000-0x000000000008B000-memory.dmp buer behavioral1/memory/2040-71-0x0000000000080000-0x000000000008B000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 1944 manager.exe -
Deletes itself 1 IoCs
pid Process 1944 manager.exe -
Loads dropped DLL 2 IoCs
pid Process 1936 8026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22.exe 1936 8026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce manager.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ActiveX Component = "C:\\Users\\Admin\\AppData\\Roaming\\ActiveX\\manager.exe" manager.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce secinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ActiveX Component = "C:\\Users\\Admin\\AppData\\Roaming\\ActiveX\\manager.exe" secinit.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2040 secinit.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1936 wrote to memory of 1944 1936 8026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22.exe 27 PID 1936 wrote to memory of 1944 1936 8026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22.exe 27 PID 1936 wrote to memory of 1944 1936 8026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22.exe 27 PID 1936 wrote to memory of 1944 1936 8026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22.exe 27 PID 1944 wrote to memory of 2040 1944 manager.exe 28 PID 1944 wrote to memory of 2040 1944 manager.exe 28 PID 1944 wrote to memory of 2040 1944 manager.exe 28 PID 1944 wrote to memory of 2040 1944 manager.exe 28 PID 1944 wrote to memory of 2040 1944 manager.exe 28 PID 1944 wrote to memory of 2040 1944 manager.exe 28 PID 1944 wrote to memory of 2040 1944 manager.exe 28 PID 1944 wrote to memory of 2040 1944 manager.exe 28 PID 1944 wrote to memory of 2040 1944 manager.exe 28 PID 1944 wrote to memory of 2040 1944 manager.exe 28 PID 1944 wrote to memory of 2040 1944 manager.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22.exe"C:\Users\Admin\AppData\Local\Temp\8026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Roaming\ActiveX\manager.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe "C:\Users\Admin\AppData\Local\Temp\8026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22.exe" ensgJJ2⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\secinit.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2040
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5b7eabb9d09f243bcb2c47d411028b07b
SHA1b65366292b2d5d917f6aaee8634e635f4b5308ef
SHA2568026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22
SHA5125285067287e4cdb4f0ee121eaf2fce2ae91d1bec0f7ebfff657dc452493db3c637b54d0cb495590bf92253ffcd4aa9681b015c258717966ef89a9b83859c300f
-
Filesize
31KB
MD5b7eabb9d09f243bcb2c47d411028b07b
SHA1b65366292b2d5d917f6aaee8634e635f4b5308ef
SHA2568026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22
SHA5125285067287e4cdb4f0ee121eaf2fce2ae91d1bec0f7ebfff657dc452493db3c637b54d0cb495590bf92253ffcd4aa9681b015c258717966ef89a9b83859c300f
-
Filesize
31KB
MD5b7eabb9d09f243bcb2c47d411028b07b
SHA1b65366292b2d5d917f6aaee8634e635f4b5308ef
SHA2568026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22
SHA5125285067287e4cdb4f0ee121eaf2fce2ae91d1bec0f7ebfff657dc452493db3c637b54d0cb495590bf92253ffcd4aa9681b015c258717966ef89a9b83859c300f
-
Filesize
31KB
MD5b7eabb9d09f243bcb2c47d411028b07b
SHA1b65366292b2d5d917f6aaee8634e635f4b5308ef
SHA2568026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22
SHA5125285067287e4cdb4f0ee121eaf2fce2ae91d1bec0f7ebfff657dc452493db3c637b54d0cb495590bf92253ffcd4aa9681b015c258717966ef89a9b83859c300f