Analysis
-
max time kernel
497s -
max time network
559s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-07-2022 16:59
Static task
static1
Behavioral task
behavioral1
Sample
C36897E9150F3FCDBA12C6076726A645.exe
Resource
win7-20220715-en
windows7-x64
6 signatures
600 seconds
Behavioral task
behavioral2
Sample
C36897E9150F3FCDBA12C6076726A645.exe
Resource
win10v2004-20220414-en
windows10-2004-x64
6 signatures
600 seconds
General
-
Target
C36897E9150F3FCDBA12C6076726A645.exe
-
Size
1.4MB
-
MD5
c36897e9150f3fcdba12c6076726a645
-
SHA1
dbd4dbfe4dabf06535353454ad1d9596f97de8b9
-
SHA256
b079f2c81638d23c59c0c04c9e2b6caf02e8bac37746d1cded77b4638bd025be
-
SHA512
0c7dde683eec79fac2e50cd33e7eb47f26e313d4dd4ebec04c79cb0a01ae15ce3cc25972f61ef187b19fe69dd8f9f903db623f1c58b739b9e036fc6ff4478078
Score
10/10
Malware Config
Extracted
Family
bandook
C2
deapproved.ru
Signatures
-
Bandook payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4316-133-0x0000000013140000-0x0000000013C7D000-memory.dmp family_bandook behavioral2/memory/4316-134-0x0000000013140000-0x0000000013C7D000-memory.dmp family_bandook behavioral2/memory/4316-135-0x0000000013140000-0x0000000013C7D000-memory.dmp family_bandook behavioral2/memory/1232-140-0x0000000013140000-0x0000000013C7D000-memory.dmp family_bandook -
Processes:
resource yara_rule behavioral2/memory/4316-131-0x0000000013140000-0x0000000013C7D000-memory.dmp upx behavioral2/memory/4316-132-0x0000000013140000-0x0000000013C7D000-memory.dmp upx behavioral2/memory/4316-133-0x0000000013140000-0x0000000013C7D000-memory.dmp upx behavioral2/memory/4316-134-0x0000000013140000-0x0000000013C7D000-memory.dmp upx behavioral2/memory/4316-135-0x0000000013140000-0x0000000013C7D000-memory.dmp upx behavioral2/memory/1232-140-0x0000000013140000-0x0000000013C7D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
msinfo32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GGES = "C:\\Users\\Admin\\AppData\\Roaming\\GGES\\GGES.exe" msinfo32.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows\CurrentVersion\Run msinfo32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
msinfo32.exepid process 4316 msinfo32.exe 4316 msinfo32.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
C36897E9150F3FCDBA12C6076726A645.exedescription pid process target process PID 3948 wrote to memory of 4316 3948 C36897E9150F3FCDBA12C6076726A645.exe msinfo32.exe PID 3948 wrote to memory of 4316 3948 C36897E9150F3FCDBA12C6076726A645.exe msinfo32.exe PID 3948 wrote to memory of 4316 3948 C36897E9150F3FCDBA12C6076726A645.exe msinfo32.exe PID 3948 wrote to memory of 4316 3948 C36897E9150F3FCDBA12C6076726A645.exe msinfo32.exe PID 3948 wrote to memory of 4316 3948 C36897E9150F3FCDBA12C6076726A645.exe msinfo32.exe PID 3948 wrote to memory of 1232 3948 C36897E9150F3FCDBA12C6076726A645.exe msinfo32.exe PID 3948 wrote to memory of 1232 3948 C36897E9150F3FCDBA12C6076726A645.exe msinfo32.exe PID 3948 wrote to memory of 1232 3948 C36897E9150F3FCDBA12C6076726A645.exe msinfo32.exe PID 3948 wrote to memory of 1232 3948 C36897E9150F3FCDBA12C6076726A645.exe msinfo32.exe PID 3948 wrote to memory of 1232 3948 C36897E9150F3FCDBA12C6076726A645.exe msinfo32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\C36897E9150F3FCDBA12C6076726A645.exe"C:\Users\Admin\AppData\Local\Temp\C36897E9150F3FCDBA12C6076726A645.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\windows\SysWOW64\msinfo32.exeC:\windows\syswow64\msinfo32.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4316
-
-
C:\windows\SysWOW64\msinfo32.exeC:\windows\syswow64\msinfo32.exe2⤵
- Adds Run key to start application
PID:1232
-