Analysis
-
max time kernel
300s -
max time network
302s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
30-04-2023 08:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1Factura de Cobro.exe
Resource
win7-20230220-en
5 signatures
300 seconds
General
-
Target
1Factura de Cobro.exe
-
Size
4.4MB
-
MD5
963dc44ec86b6f0e667716a4eafb63b1
-
SHA1
f487e173e2d8ef1c95d33fef82db94ddd2231e48
-
SHA256
14fe82910c2f207c0d0af16adb78beb03b871289d92bfeb52e7d4814b075e126
-
SHA512
6300c982b38242c3d591410672d6872b2e80d675acb421394b78b59f18e9e85c300e12e3bf7bddc82eb6aa86a5dd998064232c90c0c5d164a4c6055dab97cc2e
-
SSDEEP
49152:MxJPhRf0ewejGkahfiJWcSlAerZeWfEhiHECbFkt+aSj982TnUkcNVuV9zwu:MxTGeyk
Malware Config
Extracted
Family
bandook
C2
bomes.ru
Signatures
-
Bandook payload 7 IoCs
resource yara_rule behavioral2/memory/1904-156-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral2/memory/1904-157-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral2/memory/1904-158-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral2/memory/1904-159-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral2/memory/1904-161-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral2/memory/1904-163-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral2/memory/1904-167-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook -
resource yara_rule behavioral2/memory/1904-153-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral2/memory/1904-154-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral2/memory/1904-156-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral2/memory/1904-157-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral2/memory/1904-158-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral2/memory/1904-159-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral2/memory/1904-161-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral2/memory/1904-163-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral2/memory/1904-167-0x0000000013140000-0x0000000014009000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1904 msinfo32.exe 1904 msinfo32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3384 wrote to memory of 1904 3384 1Factura de Cobro.exe 92 PID 3384 wrote to memory of 1904 3384 1Factura de Cobro.exe 92 PID 3384 wrote to memory of 1904 3384 1Factura de Cobro.exe 92 PID 3384 wrote to memory of 5020 3384 1Factura de Cobro.exe 93 PID 3384 wrote to memory of 5020 3384 1Factura de Cobro.exe 93 PID 3384 wrote to memory of 5020 3384 1Factura de Cobro.exe 93 PID 3384 wrote to memory of 1904 3384 1Factura de Cobro.exe 92 PID 3384 wrote to memory of 1904 3384 1Factura de Cobro.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\1Factura de Cobro.exe"C:\Users\Admin\AppData\Local\Temp\1Factura de Cobro.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\windows\SysWOW64\msinfo32.exeC:\windows\syswow64\msinfo32.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1904
-
-
C:\Users\Admin\AppData\Local\Temp\1Factura de Cobro.exe"C:\Users\Admin\AppData\Local\Temp\1Factura de Cobro.exe" ooooooooooooooo2⤵PID:5020
-