Analysis
-
max time kernel
298s -
max time network
292s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
30-04-2023 08:22
Static task
static1
Behavioral task
behavioral1
Sample
Factura_Cancelada.exe
Resource
win7-20230220-en
5 signatures
300 seconds
General
-
Target
Factura_Cancelada.exe
-
Size
3.0MB
-
MD5
edb4cfa462e6cca2dda869c0d46ef109
-
SHA1
98d212c0bc943d874db679ad81fef698180c95b9
-
SHA256
a3d2ec4515b90456c1a798ae0f5bf3d9778de8403d13fc14edfb6249618acdd3
-
SHA512
b2bb36473e08674c44aee47fc091c8d80efb16a100b418f131877af2ea0aba47dd19097952b359fc49202d4292cb5da555f04a4666e55d350a8a94366df7fa50
-
SSDEEP
49152:7L7UX6elsQ9Rc5lZsZZ5YGKTaIEobUrYtG:7/UFlsC
Malware Config
Extracted
Family
bandook
C2
gombos.ru
Signatures
-
Bandook payload 8 IoCs
Processes:
resource yara_rule behavioral2/memory/4900-157-0x0000000013140000-0x0000000013E83000-memory.dmp family_bandook behavioral2/memory/4900-158-0x0000000013140000-0x0000000013E83000-memory.dmp family_bandook behavioral2/memory/4900-159-0x0000000013140000-0x0000000013E83000-memory.dmp family_bandook behavioral2/memory/4900-160-0x0000000013140000-0x0000000013E83000-memory.dmp family_bandook behavioral2/memory/4900-161-0x0000000013140000-0x0000000013E83000-memory.dmp family_bandook behavioral2/memory/4900-163-0x0000000013140000-0x0000000013E83000-memory.dmp family_bandook behavioral2/memory/4900-165-0x0000000013140000-0x0000000013E83000-memory.dmp family_bandook behavioral2/memory/4900-169-0x0000000013140000-0x0000000013E83000-memory.dmp family_bandook -
Processes:
resource yara_rule behavioral2/memory/4900-154-0x0000000013140000-0x0000000013E83000-memory.dmp upx behavioral2/memory/4900-155-0x0000000013140000-0x0000000013E83000-memory.dmp upx behavioral2/memory/4900-157-0x0000000013140000-0x0000000013E83000-memory.dmp upx behavioral2/memory/4900-158-0x0000000013140000-0x0000000013E83000-memory.dmp upx behavioral2/memory/4900-159-0x0000000013140000-0x0000000013E83000-memory.dmp upx behavioral2/memory/4900-160-0x0000000013140000-0x0000000013E83000-memory.dmp upx behavioral2/memory/4900-161-0x0000000013140000-0x0000000013E83000-memory.dmp upx behavioral2/memory/4900-163-0x0000000013140000-0x0000000013E83000-memory.dmp upx behavioral2/memory/4900-165-0x0000000013140000-0x0000000013E83000-memory.dmp upx behavioral2/memory/4900-169-0x0000000013140000-0x0000000013E83000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
msinfo32.exepid process 4900 msinfo32.exe 4900 msinfo32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
Factura_Cancelada.exedescription pid process target process PID 1700 wrote to memory of 4900 1700 Factura_Cancelada.exe msinfo32.exe PID 1700 wrote to memory of 4900 1700 Factura_Cancelada.exe msinfo32.exe PID 1700 wrote to memory of 4900 1700 Factura_Cancelada.exe msinfo32.exe PID 1700 wrote to memory of 968 1700 Factura_Cancelada.exe Factura_Cancelada.exe PID 1700 wrote to memory of 968 1700 Factura_Cancelada.exe Factura_Cancelada.exe PID 1700 wrote to memory of 968 1700 Factura_Cancelada.exe Factura_Cancelada.exe PID 1700 wrote to memory of 4900 1700 Factura_Cancelada.exe msinfo32.exe PID 1700 wrote to memory of 4900 1700 Factura_Cancelada.exe msinfo32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Factura_Cancelada.exe"C:\Users\Admin\AppData\Local\Temp\Factura_Cancelada.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\windows\SysWOW64\msinfo32.exeC:\windows\syswow64\msinfo32.exe2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\Factura_Cancelada.exeC:\Users\Admin\AppData\Local\Temp\Factura_Cancelada.exe ooooooooooooooo2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/968-153-0x00000000008D0000-0x00000000008D1000-memory.dmpFilesize
4KB
-
memory/968-172-0x0000000000400000-0x0000000000715000-memory.dmpFilesize
3.1MB
-
memory/968-170-0x0000000000400000-0x0000000000715000-memory.dmpFilesize
3.1MB
-
memory/968-167-0x00000000008D0000-0x00000000008D1000-memory.dmpFilesize
4KB
-
memory/968-166-0x0000000000400000-0x0000000000715000-memory.dmpFilesize
3.1MB
-
memory/1700-152-0x0000000000400000-0x0000000000715000-memory.dmpFilesize
3.1MB
-
memory/1700-150-0x0000000000400000-0x0000000000715000-memory.dmpFilesize
3.1MB
-
memory/1700-151-0x0000000000400000-0x0000000000715000-memory.dmpFilesize
3.1MB
-
memory/1700-181-0x0000000000400000-0x0000000000715000-memory.dmpFilesize
3.1MB
-
memory/1700-134-0x0000000000400000-0x0000000000715000-memory.dmpFilesize
3.1MB
-
memory/1700-156-0x0000000000400000-0x0000000000715000-memory.dmpFilesize
3.1MB
-
memory/1700-135-0x0000000000400000-0x0000000000715000-memory.dmpFilesize
3.1MB
-
memory/1700-136-0x0000000000400000-0x0000000000715000-memory.dmpFilesize
3.1MB
-
memory/1700-133-0x0000000002350000-0x0000000002351000-memory.dmpFilesize
4KB
-
memory/4900-160-0x0000000013140000-0x0000000013E83000-memory.dmpFilesize
13.3MB
-
memory/4900-161-0x0000000013140000-0x0000000013E83000-memory.dmpFilesize
13.3MB
-
memory/4900-163-0x0000000013140000-0x0000000013E83000-memory.dmpFilesize
13.3MB
-
memory/4900-165-0x0000000013140000-0x0000000013E83000-memory.dmpFilesize
13.3MB
-
memory/4900-159-0x0000000013140000-0x0000000013E83000-memory.dmpFilesize
13.3MB
-
memory/4900-158-0x0000000013140000-0x0000000013E83000-memory.dmpFilesize
13.3MB
-
memory/4900-169-0x0000000013140000-0x0000000013E83000-memory.dmpFilesize
13.3MB
-
memory/4900-157-0x0000000013140000-0x0000000013E83000-memory.dmpFilesize
13.3MB
-
memory/4900-155-0x0000000013140000-0x0000000013E83000-memory.dmpFilesize
13.3MB
-
memory/4900-154-0x0000000013140000-0x0000000013E83000-memory.dmpFilesize
13.3MB