Analysis
-
max time kernel
153s -
max time network
83s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 20:01
Static task
static1
Behavioral task
behavioral1
Sample
factura 009824.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
factura 009824.exe
Resource
win10v2004-20221111-en
General
-
Target
factura 009824.exe
-
Size
1.6MB
-
MD5
752e301ae1f726fd98279c779a31ef2e
-
SHA1
b2dca2b0913cbdc98d652917adcd157c778957c0
-
SHA256
bd318d45e08bceab9470b1cfec2e8a9e70c790daff0770a6bb60682653ac9480
-
SHA512
aaac35a116456d1a06c4e491265fab870ea41b28cdb35d93ba94276b75e1a418754fc9b3f35917ead90ef3959a7c3fab032a69298a8d0c0da6c2d949ad5d9fdd
-
SSDEEP
49152:ploCs/JrR6MYq4jRUiXXFpBdftBYxnbmFVpQhaYG:plOR96MR4VjLQnbUVpiG
Malware Config
Extracted
bandook
bandar123.ddns.net
Signatures
-
Bandook payload 5 IoCs
resource yara_rule behavioral1/memory/864-61-0x0000000013140000-0x0000000013B92000-memory.dmp family_bandook behavioral1/memory/864-62-0x000000001314962C-mapping.dmp family_bandook behavioral1/memory/864-66-0x0000000013140000-0x0000000013B92000-memory.dmp family_bandook behavioral1/memory/864-68-0x0000000013140000-0x0000000013B92000-memory.dmp family_bandook behavioral1/memory/864-69-0x0000000013140000-0x0000000013B92000-memory.dmp family_bandook -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion factura 009824.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Wine factura 009824.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\uis = "C:\\Users\\Admin\\AppData\\Local\\UIS\\uis.exe" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\uis = "C:\\Users\\Admin\\AppData\\Local\\UIS\\uis.exe" iexplore.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1720 set thread context of 864 1720 factura 009824.exe 27 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1720 factura 009824.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1720 wrote to memory of 864 1720 factura 009824.exe 27 PID 1720 wrote to memory of 864 1720 factura 009824.exe 27 PID 1720 wrote to memory of 864 1720 factura 009824.exe 27 PID 1720 wrote to memory of 864 1720 factura 009824.exe 27 PID 1720 wrote to memory of 864 1720 factura 009824.exe 27 PID 1720 wrote to memory of 864 1720 factura 009824.exe 27 PID 864 wrote to memory of 1768 864 factura 009824.exe 28 PID 864 wrote to memory of 1768 864 factura 009824.exe 28 PID 864 wrote to memory of 1768 864 factura 009824.exe 28 PID 864 wrote to memory of 1768 864 factura 009824.exe 28 PID 864 wrote to memory of 1768 864 factura 009824.exe 28 PID 864 wrote to memory of 956 864 factura 009824.exe 29 PID 864 wrote to memory of 956 864 factura 009824.exe 29 PID 864 wrote to memory of 956 864 factura 009824.exe 29 PID 864 wrote to memory of 956 864 factura 009824.exe 29 PID 864 wrote to memory of 956 864 factura 009824.exe 29 PID 864 wrote to memory of 1848 864 factura 009824.exe 30 PID 864 wrote to memory of 1848 864 factura 009824.exe 30 PID 864 wrote to memory of 1848 864 factura 009824.exe 30 PID 864 wrote to memory of 1848 864 factura 009824.exe 30 PID 864 wrote to memory of 1848 864 factura 009824.exe 30 PID 864 wrote to memory of 644 864 factura 009824.exe 31 PID 864 wrote to memory of 644 864 factura 009824.exe 31 PID 864 wrote to memory of 644 864 factura 009824.exe 31 PID 864 wrote to memory of 644 864 factura 009824.exe 31 PID 864 wrote to memory of 644 864 factura 009824.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\factura 009824.exe"C:\Users\Admin\AppData\Local\Temp\factura 009824.exe"1⤵
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\factura 009824.exe"C:\Users\Admin\AppData\Local\Temp\factura 009824.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵PID:1768
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Adds Run key to start application
PID:956
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵PID:1848
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Adds Run key to start application
PID:644
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5752e301ae1f726fd98279c779a31ef2e
SHA1b2dca2b0913cbdc98d652917adcd157c778957c0
SHA256bd318d45e08bceab9470b1cfec2e8a9e70c790daff0770a6bb60682653ac9480
SHA512aaac35a116456d1a06c4e491265fab870ea41b28cdb35d93ba94276b75e1a418754fc9b3f35917ead90ef3959a7c3fab032a69298a8d0c0da6c2d949ad5d9fdd