Analysis
-
max time kernel
298s -
max time network
301s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
30-04-2023 08:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1Factura de Cobro.exe
Resource
win7-20230220-en
5 signatures
300 seconds
General
-
Target
1Factura de Cobro.exe
-
Size
4.4MB
-
MD5
963dc44ec86b6f0e667716a4eafb63b1
-
SHA1
f487e173e2d8ef1c95d33fef82db94ddd2231e48
-
SHA256
14fe82910c2f207c0d0af16adb78beb03b871289d92bfeb52e7d4814b075e126
-
SHA512
6300c982b38242c3d591410672d6872b2e80d675acb421394b78b59f18e9e85c300e12e3bf7bddc82eb6aa86a5dd998064232c90c0c5d164a4c6055dab97cc2e
-
SSDEEP
49152:MxJPhRf0ewejGkahfiJWcSlAerZeWfEhiHECbFkt+aSj982TnUkcNVuV9zwu:MxTGeyk
Malware Config
Extracted
Family
bandook
C2
bomes.ru
Signatures
-
Bandook payload 7 IoCs
resource yara_rule behavioral1/memory/1808-81-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral1/memory/1808-86-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral1/memory/1808-93-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral1/memory/1808-95-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral1/memory/1808-96-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral1/memory/1808-98-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral1/memory/1808-100-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook -
resource yara_rule behavioral1/memory/1808-78-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/1808-79-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/1808-81-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/1808-86-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/1808-93-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/1808-95-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/1808-96-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/1808-98-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/1808-100-0x0000000013140000-0x0000000014009000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1808 msinfo32.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1376 wrote to memory of 1808 1376 1Factura de Cobro.exe 28 PID 1376 wrote to memory of 1808 1376 1Factura de Cobro.exe 28 PID 1376 wrote to memory of 1808 1376 1Factura de Cobro.exe 28 PID 1376 wrote to memory of 1808 1376 1Factura de Cobro.exe 28 PID 1376 wrote to memory of 1592 1376 1Factura de Cobro.exe 29 PID 1376 wrote to memory of 1592 1376 1Factura de Cobro.exe 29 PID 1376 wrote to memory of 1592 1376 1Factura de Cobro.exe 29 PID 1376 wrote to memory of 1592 1376 1Factura de Cobro.exe 29 PID 1376 wrote to memory of 1808 1376 1Factura de Cobro.exe 28 PID 1376 wrote to memory of 1808 1376 1Factura de Cobro.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1Factura de Cobro.exe"C:\Users\Admin\AppData\Local\Temp\1Factura de Cobro.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\windows\syswow64\msinfo32.exeC:\windows\syswow64\msinfo32.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1808
-
-
C:\Users\Admin\AppData\Local\Temp\1Factura de Cobro.exe"C:\Users\Admin\AppData\Local\Temp\1Factura de Cobro.exe" ooooooooooooooo2⤵PID:1592
-