Analysis
-
max time kernel
303s -
max time network
286s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
30-04-2023 08:21
Static task
static1
Behavioral task
behavioral1
Sample
Factura PDF.exe
Resource
win7-20230220-en
5 signatures
300 seconds
General
-
Target
Factura PDF.exe
-
Size
1.4MB
-
MD5
13c45a10e3b3f932e2c9e76d33a70eb1
-
SHA1
df49a65c54d3335ad7274ccb7312f07ddfecb48b
-
SHA256
445bc1991044f1852e878421bdd17c5eee091069f11d2107564492435a01182b
-
SHA512
51c49a408c24627996ac30fc3c519f6e77d3ada6f7c924cbacfcd67bd88678ab6423d8acb6ed2953a8fe4a6662081b2f00409b050d61f76678d555e02358edf7
-
SSDEEP
24576:/1RS4xszUmeE6+NbEZlnibawoGif8pk8kjUiuUiBFN6VQu0:/vSIG+xrPjUimlPf
Malware Config
Extracted
Family
bandook
C2
deapproved.ru
Signatures
-
Bandook payload 7 IoCs
resource yara_rule behavioral2/memory/780-155-0x0000000013140000-0x0000000013C7D000-memory.dmp family_bandook behavioral2/memory/780-156-0x0000000013140000-0x0000000013C7D000-memory.dmp family_bandook behavioral2/memory/780-157-0x0000000013140000-0x0000000013C7D000-memory.dmp family_bandook behavioral2/memory/780-158-0x0000000013140000-0x0000000013C7D000-memory.dmp family_bandook behavioral2/memory/780-162-0x0000000013140000-0x0000000013C7D000-memory.dmp family_bandook behavioral2/memory/780-163-0x0000000013140000-0x0000000013C7D000-memory.dmp family_bandook behavioral2/memory/780-165-0x0000000013140000-0x0000000013C7D000-memory.dmp family_bandook -
resource yara_rule behavioral2/memory/780-153-0x0000000013140000-0x0000000013C7D000-memory.dmp upx behavioral2/memory/780-154-0x0000000013140000-0x0000000013C7D000-memory.dmp upx behavioral2/memory/780-155-0x0000000013140000-0x0000000013C7D000-memory.dmp upx behavioral2/memory/780-156-0x0000000013140000-0x0000000013C7D000-memory.dmp upx behavioral2/memory/780-157-0x0000000013140000-0x0000000013C7D000-memory.dmp upx behavioral2/memory/780-158-0x0000000013140000-0x0000000013C7D000-memory.dmp upx behavioral2/memory/780-162-0x0000000013140000-0x0000000013C7D000-memory.dmp upx behavioral2/memory/780-163-0x0000000013140000-0x0000000013C7D000-memory.dmp upx behavioral2/memory/780-165-0x0000000013140000-0x0000000013C7D000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 780 msinfo32.exe 780 msinfo32.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2368 wrote to memory of 780 2368 Factura PDF.exe 90 PID 2368 wrote to memory of 780 2368 Factura PDF.exe 90 PID 2368 wrote to memory of 780 2368 Factura PDF.exe 90 PID 2368 wrote to memory of 780 2368 Factura PDF.exe 90 PID 2368 wrote to memory of 780 2368 Factura PDF.exe 90