Analysis
-
max time kernel
92s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
14-07-2022 15:34
Behavioral task
behavioral1
Sample
8026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
8026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22.exe
Resource
win10v2004-20220414-en
General
-
Target
8026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22.exe
-
Size
31KB
-
MD5
b7eabb9d09f243bcb2c47d411028b07b
-
SHA1
b65366292b2d5d917f6aaee8634e635f4b5308ef
-
SHA256
8026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22
-
SHA512
5285067287e4cdb4f0ee121eaf2fce2ae91d1bec0f7ebfff657dc452493db3c637b54d0cb495590bf92253ffcd4aa9681b015c258717966ef89a9b83859c300f
Malware Config
Extracted
buer
http://looad.top/
http://looad02.top/
eqqm7,,ill^a+qlm,
eqqm7,,ill^a-/+qlm,
Signatures
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\ActiveX\manager.exe buer C:\Users\Admin\AppData\Roaming\ActiveX\manager.exe buer behavioral2/memory/632-133-0x0000000000000000-mapping.dmp buer behavioral2/memory/632-134-0x00000000012F0000-0x00000000012FB000-memory.dmp buer -
Executes dropped EXE 1 IoCs
Processes:
manager.exepid process 1892 manager.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
manager.exesecinit.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce manager.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ActiveX Component = "C:\\Users\\Admin\\AppData\\Roaming\\ActiveX\\manager.exe" manager.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce secinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ActiveX Component = "C:\\Users\\Admin\\AppData\\Roaming\\ActiveX\\manager.exe" secinit.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
secinit.exepid process 632 secinit.exe 632 secinit.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
8026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22.exemanager.exedescription pid process target process PID 1256 wrote to memory of 1892 1256 8026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22.exe manager.exe PID 1256 wrote to memory of 1892 1256 8026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22.exe manager.exe PID 1256 wrote to memory of 1892 1256 8026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22.exe manager.exe PID 1892 wrote to memory of 632 1892 manager.exe secinit.exe PID 1892 wrote to memory of 632 1892 manager.exe secinit.exe PID 1892 wrote to memory of 632 1892 manager.exe secinit.exe PID 1892 wrote to memory of 632 1892 manager.exe secinit.exe PID 1892 wrote to memory of 632 1892 manager.exe secinit.exe PID 1892 wrote to memory of 632 1892 manager.exe secinit.exe PID 1892 wrote to memory of 632 1892 manager.exe secinit.exe PID 1892 wrote to memory of 632 1892 manager.exe secinit.exe PID 1892 wrote to memory of 632 1892 manager.exe secinit.exe PID 1892 wrote to memory of 632 1892 manager.exe secinit.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22.exe"C:\Users\Admin\AppData\Local\Temp\8026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Roaming\ActiveX\manager.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe "C:\Users\Admin\AppData\Local\Temp\8026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22.exe" ensgJJ2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\secinit.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:632
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5b7eabb9d09f243bcb2c47d411028b07b
SHA1b65366292b2d5d917f6aaee8634e635f4b5308ef
SHA2568026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22
SHA5125285067287e4cdb4f0ee121eaf2fce2ae91d1bec0f7ebfff657dc452493db3c637b54d0cb495590bf92253ffcd4aa9681b015c258717966ef89a9b83859c300f
-
Filesize
31KB
MD5b7eabb9d09f243bcb2c47d411028b07b
SHA1b65366292b2d5d917f6aaee8634e635f4b5308ef
SHA2568026e96ade96c109afdeb9bd32d7cdb47cafc596dedd943dbd74828ca684cf22
SHA5125285067287e4cdb4f0ee121eaf2fce2ae91d1bec0f7ebfff657dc452493db3c637b54d0cb495590bf92253ffcd4aa9681b015c258717966ef89a9b83859c300f