Analysis
-
max time kernel
149s -
max time network
87s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 15:52
Static task
static1
Behavioral task
behavioral1
Sample
c980f24533ca7c2e289191ff09a941d3dd1dfd5ebf6c884ff6c65641e3454b6e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c980f24533ca7c2e289191ff09a941d3dd1dfd5ebf6c884ff6c65641e3454b6e.exe
Resource
win10v2004-20220812-en
General
-
Target
c980f24533ca7c2e289191ff09a941d3dd1dfd5ebf6c884ff6c65641e3454b6e.exe
-
Size
1.5MB
-
MD5
8a3559d0186867422bdeda233c42e837
-
SHA1
fc2fc7010739c22050d0ebb8d5d5212083fbbc5e
-
SHA256
c980f24533ca7c2e289191ff09a941d3dd1dfd5ebf6c884ff6c65641e3454b6e
-
SHA512
0d2b76bb65139de7ee2b2412f885fd8af7e60c61489a05ce3e7d99a91ad3f4d3b4a310c67bcb9897b29a5937dc0bc685712fc89fae25e03a59d0c424c9df1569
-
SSDEEP
24576:bqtusu+tVxHPidqUAIM3CNQgII6SZlCDHh3R5IdBAJ58:bZwd4MbyZlUBB5mA
Malware Config
Extracted
bandook
soniaswiss.ddns.net
Signatures
-
Bandook payload 5 IoCs
resource yara_rule behavioral1/memory/1892-56-0x0000000013140000-0x0000000013B8E000-memory.dmp family_bandook behavioral1/memory/1892-57-0x0000000013148315-mapping.dmp family_bandook behavioral1/memory/1892-60-0x0000000013140000-0x0000000013B8E000-memory.dmp family_bandook behavioral1/memory/1892-61-0x0000000013140000-0x0000000013B8E000-memory.dmp family_bandook behavioral1/memory/1892-62-0x0000000013140000-0x0000000013B8E000-memory.dmp family_bandook -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\obm = "C:\\Users\\Admin\\AppData\\Local\\obm\\obm.exe" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\obm = "C:\\Users\\Admin\\AppData\\Local\\obm\\obm.exe" iexplore.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2036 set thread context of 1892 2036 c980f24533ca7c2e289191ff09a941d3dd1dfd5ebf6c884ff6c65641e3454b6e.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1892 2036 c980f24533ca7c2e289191ff09a941d3dd1dfd5ebf6c884ff6c65641e3454b6e.exe 28 PID 2036 wrote to memory of 1892 2036 c980f24533ca7c2e289191ff09a941d3dd1dfd5ebf6c884ff6c65641e3454b6e.exe 28 PID 2036 wrote to memory of 1892 2036 c980f24533ca7c2e289191ff09a941d3dd1dfd5ebf6c884ff6c65641e3454b6e.exe 28 PID 2036 wrote to memory of 1892 2036 c980f24533ca7c2e289191ff09a941d3dd1dfd5ebf6c884ff6c65641e3454b6e.exe 28 PID 2036 wrote to memory of 1892 2036 c980f24533ca7c2e289191ff09a941d3dd1dfd5ebf6c884ff6c65641e3454b6e.exe 28 PID 2036 wrote to memory of 1892 2036 c980f24533ca7c2e289191ff09a941d3dd1dfd5ebf6c884ff6c65641e3454b6e.exe 28 PID 1892 wrote to memory of 1500 1892 c980f24533ca7c2e289191ff09a941d3dd1dfd5ebf6c884ff6c65641e3454b6e.exe 29 PID 1892 wrote to memory of 1500 1892 c980f24533ca7c2e289191ff09a941d3dd1dfd5ebf6c884ff6c65641e3454b6e.exe 29 PID 1892 wrote to memory of 1500 1892 c980f24533ca7c2e289191ff09a941d3dd1dfd5ebf6c884ff6c65641e3454b6e.exe 29 PID 1892 wrote to memory of 1500 1892 c980f24533ca7c2e289191ff09a941d3dd1dfd5ebf6c884ff6c65641e3454b6e.exe 29 PID 1892 wrote to memory of 1500 1892 c980f24533ca7c2e289191ff09a941d3dd1dfd5ebf6c884ff6c65641e3454b6e.exe 29 PID 1892 wrote to memory of 776 1892 c980f24533ca7c2e289191ff09a941d3dd1dfd5ebf6c884ff6c65641e3454b6e.exe 30 PID 1892 wrote to memory of 776 1892 c980f24533ca7c2e289191ff09a941d3dd1dfd5ebf6c884ff6c65641e3454b6e.exe 30 PID 1892 wrote to memory of 776 1892 c980f24533ca7c2e289191ff09a941d3dd1dfd5ebf6c884ff6c65641e3454b6e.exe 30 PID 1892 wrote to memory of 776 1892 c980f24533ca7c2e289191ff09a941d3dd1dfd5ebf6c884ff6c65641e3454b6e.exe 30 PID 1892 wrote to memory of 776 1892 c980f24533ca7c2e289191ff09a941d3dd1dfd5ebf6c884ff6c65641e3454b6e.exe 30 PID 1892 wrote to memory of 1392 1892 c980f24533ca7c2e289191ff09a941d3dd1dfd5ebf6c884ff6c65641e3454b6e.exe 31 PID 1892 wrote to memory of 1392 1892 c980f24533ca7c2e289191ff09a941d3dd1dfd5ebf6c884ff6c65641e3454b6e.exe 31 PID 1892 wrote to memory of 1392 1892 c980f24533ca7c2e289191ff09a941d3dd1dfd5ebf6c884ff6c65641e3454b6e.exe 31 PID 1892 wrote to memory of 1392 1892 c980f24533ca7c2e289191ff09a941d3dd1dfd5ebf6c884ff6c65641e3454b6e.exe 31 PID 1892 wrote to memory of 1392 1892 c980f24533ca7c2e289191ff09a941d3dd1dfd5ebf6c884ff6c65641e3454b6e.exe 31 PID 1892 wrote to memory of 360 1892 c980f24533ca7c2e289191ff09a941d3dd1dfd5ebf6c884ff6c65641e3454b6e.exe 32 PID 1892 wrote to memory of 360 1892 c980f24533ca7c2e289191ff09a941d3dd1dfd5ebf6c884ff6c65641e3454b6e.exe 32 PID 1892 wrote to memory of 360 1892 c980f24533ca7c2e289191ff09a941d3dd1dfd5ebf6c884ff6c65641e3454b6e.exe 32 PID 1892 wrote to memory of 360 1892 c980f24533ca7c2e289191ff09a941d3dd1dfd5ebf6c884ff6c65641e3454b6e.exe 32 PID 1892 wrote to memory of 360 1892 c980f24533ca7c2e289191ff09a941d3dd1dfd5ebf6c884ff6c65641e3454b6e.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\c980f24533ca7c2e289191ff09a941d3dd1dfd5ebf6c884ff6c65641e3454b6e.exe"C:\Users\Admin\AppData\Local\Temp\c980f24533ca7c2e289191ff09a941d3dd1dfd5ebf6c884ff6c65641e3454b6e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\c980f24533ca7c2e289191ff09a941d3dd1dfd5ebf6c884ff6c65641e3454b6e.exe"C:\Users\Admin\AppData\Local\Temp\c980f24533ca7c2e289191ff09a941d3dd1dfd5ebf6c884ff6c65641e3454b6e.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵PID:1500
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Adds Run key to start application
PID:776
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵PID:1392
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Adds Run key to start application
PID:360
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD58a3559d0186867422bdeda233c42e837
SHA1fc2fc7010739c22050d0ebb8d5d5212083fbbc5e
SHA256c980f24533ca7c2e289191ff09a941d3dd1dfd5ebf6c884ff6c65641e3454b6e
SHA5120d2b76bb65139de7ee2b2412f885fd8af7e60c61489a05ce3e7d99a91ad3f4d3b4a310c67bcb9897b29a5937dc0bc685712fc89fae25e03a59d0c424c9df1569