Analysis
-
max time kernel
598s -
max time network
575s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
13-04-2023 15:45
Static task
static1
Behavioral task
behavioral1
Sample
RECIBO DE PAGO #4858.exe
Resource
win10-20230220-en
9 signatures
600 seconds
General
-
Target
RECIBO DE PAGO #4858.exe
-
Size
2.9MB
-
MD5
e751c63b9d44912e8d728c4b42ff781f
-
SHA1
5d8617c3fcf7bc47f9e2d766b6d5e745a66e6535
-
SHA256
fa810720c2221e423174525d355252264f79ef9492f9050ed9504d0e33a24b1e
-
SHA512
607862f082f977dffb3ed51e0b7668c560a7b1d6afb7ad6fa73cfb227e6886f4be25f3479bee2983f7f17c49cfcb594dfea9859f32eff665d00474e2e3efa834
-
SSDEEP
49152:fm1oRufNhy88P/iIXW2VJXmvj1G/LWlisw3hs:fmcufi8b
Score
10/10
Malware Config
Extracted
Family
bandook
C2
deapproved.ru
Signatures
-
Bandook payload 8 IoCs
resource yara_rule behavioral1/memory/3384-160-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral1/memory/3384-161-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral1/memory/3384-162-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral1/memory/3384-163-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral1/memory/3384-165-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral1/memory/3384-167-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral1/memory/3384-171-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral1/memory/508-209-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook -
resource yara_rule behavioral1/memory/3384-156-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/3384-157-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/3384-160-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/3384-161-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/3384-162-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/3384-163-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/3384-165-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/3384-167-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/3384-171-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/508-209-0x0000000013140000-0x0000000014009000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Windows\CurrentVersion\Run msinfo32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Windows\CurrentVersion\Run\SG = "C:\\Users\\Admin\\AppData\\Roaming\\SG\\SG.exe" msinfo32.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 903633f62f6ed901 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008a702c863227b745aefca3d2bb9571e8000000000200000000001066000000010000200000006e9fa4641d01569be8aed50a8ff11d3acdf6d71e9fffd5c0cacb653feafb3188000000000e8000000002000020000000670a0f5f8f3b5bb31f869b6c2f51ca2de7232f509ed2ae43db102c32a15a7fd620000000669b5040516ab425d45ea5998f586b005992a4bea1365e26f7b474846397387340000000076879b0af9783d9b1a5c890e4e061bbbcb9770acbd65fc7e9d73795291b5bccc4f059a34331944df78c82522a7a0f0b38ab01786e4b1291f361f59cda134686 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50044bf62f6ed901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008a702c863227b745aefca3d2bb9571e800000000020000000000106600000001000020000000a7be62a6888a26762ef4060e7cab2d26c29ea7839442d8018a1e6cd8b468511e000000000e8000000002000020000000cb43fdd3904b491137cf67c3bec2f169363cb4568d38cbdb0a0b90f8824cb52320000000c2fa793041b4cf2a1a919407c726e9243d97fd7f278a434c84a6b05723609a5940000000f378ea707dcfb9b59db820fa67e496f2b5832d587e30490b2ac310bddd44091e5f7a8a569f8cd70432ccaae4b8a3bfbcc7967c79734806872c6ef85807a0a83f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1C40139E-DA23-11ED-8E3B-FEFF0DC94917} = "0" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3384 msinfo32.exe 3384 msinfo32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1248 iexplore.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1248 iexplore.exe 1248 iexplore.exe 4240 IEXPLORE.EXE 4240 IEXPLORE.EXE 4240 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1248 wrote to memory of 4240 1248 iexplore.exe 70 PID 1248 wrote to memory of 4240 1248 iexplore.exe 70 PID 1248 wrote to memory of 4240 1248 iexplore.exe 70 PID 4604 wrote to memory of 3384 4604 RECIBO DE PAGO #4858.exe 71 PID 4604 wrote to memory of 3384 4604 RECIBO DE PAGO #4858.exe 71 PID 4604 wrote to memory of 3384 4604 RECIBO DE PAGO #4858.exe 71 PID 4604 wrote to memory of 4308 4604 RECIBO DE PAGO #4858.exe 72 PID 4604 wrote to memory of 4308 4604 RECIBO DE PAGO #4858.exe 72 PID 4604 wrote to memory of 4308 4604 RECIBO DE PAGO #4858.exe 72 PID 4604 wrote to memory of 3384 4604 RECIBO DE PAGO #4858.exe 71 PID 4604 wrote to memory of 3384 4604 RECIBO DE PAGO #4858.exe 71 PID 4308 wrote to memory of 508 4308 RECIBO DE PAGO #4858.exe 73 PID 4308 wrote to memory of 508 4308 RECIBO DE PAGO #4858.exe 73 PID 4308 wrote to memory of 508 4308 RECIBO DE PAGO #4858.exe 73 PID 4308 wrote to memory of 508 4308 RECIBO DE PAGO #4858.exe 73 PID 4308 wrote to memory of 508 4308 RECIBO DE PAGO #4858.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\RECIBO DE PAGO #4858.exe"C:\Users\Admin\AppData\Local\Temp\RECIBO DE PAGO #4858.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\windows\syswow64\msinfo32.exeC:\windows\syswow64\msinfo32.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3384
-
-
C:\Users\Admin\AppData\Local\Temp\RECIBO DE PAGO #4858.exe"C:\Users\Admin\AppData\Local\Temp\RECIBO DE PAGO #4858.exe" dkddkdkkdkdd ddd2⤵
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\windows\syswow64\msinfo32.exeC:\windows\syswow64\msinfo32.exe3⤵
- Adds Run key to start application
PID:508
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -nohome1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1248 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4240
-