Analysis
-
max time kernel
300s -
max time network
301s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
27-04-2023 15:21
Static task
static1
Behavioral task
behavioral1
Sample
PRINTDOC-26042023.exe
Resource
win7-20230220-en
5 signatures
300 seconds
General
-
Target
PRINTDOC-26042023.exe
-
Size
4.1MB
-
MD5
51dc4f8ee85bf56c04daf973753d3d69
-
SHA1
d53dc03dfec66f48753c76c9065bc4f60556feac
-
SHA256
f4bd7128b8c371149045062f195fc732b74893fb67a7238457e4b4b599c33329
-
SHA512
e9a82f1559afcf9d7931cb32b0d03e2cffef3fdd074ee8e4f783fa23752854c5bb69ca853a91a9f2d99bdecd2221abe9d8cd059c7d99491866c7ca26300687a0
-
SSDEEP
49152:ibVNUatVC8ne36/1o764I2TiFD0ca4E1HFUgim9sTUqUynZsX259LhZ4p:iW
Malware Config
Extracted
Family
bandook
C2
gombos.ru
Signatures
-
Bandook payload 8 IoCs
resource yara_rule behavioral1/memory/1864-81-0x0000000013140000-0x0000000013F1F000-memory.dmp family_bandook behavioral1/memory/1864-82-0x0000000013140000-0x0000000013F1F000-memory.dmp family_bandook behavioral1/memory/1864-88-0x0000000013140000-0x0000000013F1F000-memory.dmp family_bandook behavioral1/memory/1864-91-0x0000000013140000-0x0000000013F1F000-memory.dmp family_bandook behavioral1/memory/1864-92-0x0000000013140000-0x0000000013F1F000-memory.dmp family_bandook behavioral1/memory/1864-93-0x0000000013140000-0x0000000013F1F000-memory.dmp family_bandook behavioral1/memory/1864-95-0x0000000013140000-0x0000000013F1F000-memory.dmp family_bandook behavioral1/memory/1864-97-0x0000000013140000-0x0000000013F1F000-memory.dmp family_bandook -
resource yara_rule behavioral1/memory/1864-79-0x0000000013140000-0x0000000013F1F000-memory.dmp upx behavioral1/memory/1864-80-0x0000000013140000-0x0000000013F1F000-memory.dmp upx behavioral1/memory/1864-81-0x0000000013140000-0x0000000013F1F000-memory.dmp upx behavioral1/memory/1864-82-0x0000000013140000-0x0000000013F1F000-memory.dmp upx behavioral1/memory/1864-88-0x0000000013140000-0x0000000013F1F000-memory.dmp upx behavioral1/memory/1864-91-0x0000000013140000-0x0000000013F1F000-memory.dmp upx behavioral1/memory/1864-92-0x0000000013140000-0x0000000013F1F000-memory.dmp upx behavioral1/memory/1864-93-0x0000000013140000-0x0000000013F1F000-memory.dmp upx behavioral1/memory/1864-95-0x0000000013140000-0x0000000013F1F000-memory.dmp upx behavioral1/memory/1864-97-0x0000000013140000-0x0000000013F1F000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1864 msinfo32.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 836 wrote to memory of 1864 836 PRINTDOC-26042023.exe 27 PID 836 wrote to memory of 1864 836 PRINTDOC-26042023.exe 27 PID 836 wrote to memory of 1864 836 PRINTDOC-26042023.exe 27 PID 836 wrote to memory of 1864 836 PRINTDOC-26042023.exe 27 PID 836 wrote to memory of 612 836 PRINTDOC-26042023.exe 28 PID 836 wrote to memory of 612 836 PRINTDOC-26042023.exe 28 PID 836 wrote to memory of 612 836 PRINTDOC-26042023.exe 28 PID 836 wrote to memory of 612 836 PRINTDOC-26042023.exe 28 PID 836 wrote to memory of 1864 836 PRINTDOC-26042023.exe 27 PID 836 wrote to memory of 1864 836 PRINTDOC-26042023.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\PRINTDOC-26042023.exe"C:\Users\Admin\AppData\Local\Temp\PRINTDOC-26042023.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:836 -
C:\windows\syswow64\msinfo32.exeC:\windows\syswow64\msinfo32.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1864
-
-
C:\Users\Admin\AppData\Local\Temp\PRINTDOC-26042023.exeC:\Users\Admin\AppData\Local\Temp\PRINTDOC-26042023.exe ooooooooooooooo2⤵PID:612
-