Analysis
-
max time kernel
301s -
max time network
302s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
30-04-2023 08:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1Cotizacion_Orden.exe
Resource
win7-20230220-en
5 signatures
300 seconds
General
-
Target
1Cotizacion_Orden.exe
-
Size
4.4MB
-
MD5
977f1f35f0bd4875b819699fe4766f6a
-
SHA1
abdf999e4c411e2f8f9c7db35bc84de94eeef6dd
-
SHA256
cd154f108be279c059b94990062bce732143c791a0ed45f37b8580cab615a8fe
-
SHA512
388afdb5dc0946f8656cb082d961d7b372b43e4db126b487c40a2b4b7af1159bb7542fe0395e5d1940e0c0b51f341d601eb351121df56c6b48da0f2385a845f8
-
SSDEEP
49152:VxJPhlQg2pC3EDJqqX4nu32Gnez0wY3IzObmbHms+fNpqv98uTnUkcNVuV9zwu:VxTrh3E
Malware Config
Extracted
Family
bandook
C2
bomes.ru
Signatures
-
Bandook payload 7 IoCs
Processes:
resource yara_rule behavioral2/memory/1660-156-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral2/memory/1660-157-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral2/memory/1660-158-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral2/memory/1660-160-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral2/memory/1660-161-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral2/memory/1660-163-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral2/memory/1660-167-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook -
Processes:
resource yara_rule behavioral2/memory/1660-153-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral2/memory/1660-154-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral2/memory/1660-156-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral2/memory/1660-157-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral2/memory/1660-158-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral2/memory/1660-160-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral2/memory/1660-161-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral2/memory/1660-163-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral2/memory/1660-167-0x0000000013140000-0x0000000014009000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
msinfo32.exepid process 1660 msinfo32.exe 1660 msinfo32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
1Cotizacion_Orden.exedescription pid process target process PID 2600 wrote to memory of 1660 2600 1Cotizacion_Orden.exe msinfo32.exe PID 2600 wrote to memory of 1660 2600 1Cotizacion_Orden.exe msinfo32.exe PID 2600 wrote to memory of 1660 2600 1Cotizacion_Orden.exe msinfo32.exe PID 2600 wrote to memory of 3184 2600 1Cotizacion_Orden.exe 1Cotizacion_Orden.exe PID 2600 wrote to memory of 3184 2600 1Cotizacion_Orden.exe 1Cotizacion_Orden.exe PID 2600 wrote to memory of 3184 2600 1Cotizacion_Orden.exe 1Cotizacion_Orden.exe PID 2600 wrote to memory of 1660 2600 1Cotizacion_Orden.exe msinfo32.exe PID 2600 wrote to memory of 1660 2600 1Cotizacion_Orden.exe msinfo32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1Cotizacion_Orden.exe"C:\Users\Admin\AppData\Local\Temp\1Cotizacion_Orden.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\windows\SysWOW64\msinfo32.exeC:\windows\syswow64\msinfo32.exe2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\1Cotizacion_Orden.exeC:\Users\Admin\AppData\Local\Temp\1Cotizacion_Orden.exe ooooooooooooooo2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1660-160-0x0000000013140000-0x0000000014009000-memory.dmpFilesize
14.8MB
-
memory/1660-156-0x0000000013140000-0x0000000014009000-memory.dmpFilesize
14.8MB
-
memory/1660-154-0x0000000013140000-0x0000000014009000-memory.dmpFilesize
14.8MB
-
memory/1660-167-0x0000000013140000-0x0000000014009000-memory.dmpFilesize
14.8MB
-
memory/1660-163-0x0000000013140000-0x0000000014009000-memory.dmpFilesize
14.8MB
-
memory/1660-161-0x0000000013140000-0x0000000014009000-memory.dmpFilesize
14.8MB
-
memory/1660-158-0x0000000013140000-0x0000000014009000-memory.dmpFilesize
14.8MB
-
memory/1660-157-0x0000000013140000-0x0000000014009000-memory.dmpFilesize
14.8MB
-
memory/1660-153-0x0000000013140000-0x0000000014009000-memory.dmpFilesize
14.8MB
-
memory/2600-150-0x0000000000400000-0x0000000000869000-memory.dmpFilesize
4.4MB
-
memory/2600-149-0x0000000000400000-0x0000000000869000-memory.dmpFilesize
4.4MB
-
memory/2600-179-0x0000000000400000-0x0000000000869000-memory.dmpFilesize
4.4MB
-
memory/2600-155-0x0000000000400000-0x0000000000869000-memory.dmpFilesize
4.4MB
-
memory/2600-151-0x0000000000400000-0x0000000000869000-memory.dmpFilesize
4.4MB
-
memory/2600-134-0x0000000000400000-0x0000000000869000-memory.dmpFilesize
4.4MB
-
memory/2600-133-0x0000000000A00000-0x0000000000A01000-memory.dmpFilesize
4KB
-
memory/2600-135-0x0000000000400000-0x0000000000869000-memory.dmpFilesize
4.4MB
-
memory/2600-137-0x0000000000400000-0x0000000000869000-memory.dmpFilesize
4.4MB
-
memory/2600-136-0x0000000000400000-0x0000000000869000-memory.dmpFilesize
4.4MB
-
memory/3184-166-0x00000000024A0000-0x00000000024A1000-memory.dmpFilesize
4KB
-
memory/3184-164-0x0000000000400000-0x0000000000869000-memory.dmpFilesize
4.4MB
-
memory/3184-170-0x0000000000400000-0x0000000000869000-memory.dmpFilesize
4.4MB
-
memory/3184-152-0x00000000024A0000-0x00000000024A1000-memory.dmpFilesize
4KB