Analysis
-
max time kernel
291s -
max time network
289s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
30-04-2023 08:24
Static task
static1
Behavioral task
behavioral1
Sample
Retenciones.exe
Resource
win7-20230220-en
5 signatures
300 seconds
General
-
Target
Retenciones.exe
-
Size
3.2MB
-
MD5
6bd530a8417b6ab6b5ea0230ebe16857
-
SHA1
9e7cdf3192707cd06ef9626d3d1867a7e419b23e
-
SHA256
ab8d1ee87ac5dc2adb51e45588ea7934aa3a50ceb4033ac2aca4d16f320ab609
-
SHA512
8c7d0317d2112f79b062fc73bd8f45c8475dece6d624a3721e4b14d84b13eb40b4ff27259dfb5f29e129c3d714a33d12695bf134463b565beb5698d5dbe45104
-
SSDEEP
49152:N+Laj3TXU7Ni5AacXjIuqGvGNP0FWtK7zI70l:ULATX0
Malware Config
Extracted
Family
bandook
C2
deapproved.ru
Signatures
-
Bandook payload 7 IoCs
resource yara_rule behavioral1/memory/1560-79-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral1/memory/1560-80-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral1/memory/1560-86-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral1/memory/1560-87-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral1/memory/1560-88-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral1/memory/1560-90-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral1/memory/1560-92-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook -
resource yara_rule behavioral1/memory/1560-77-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/1560-78-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/1560-79-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/1560-80-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/1560-86-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/1560-87-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/1560-88-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/1560-90-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/1560-92-0x0000000013140000-0x0000000014009000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1560 msinfo32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1352 wrote to memory of 1560 1352 Retenciones.exe 28 PID 1352 wrote to memory of 1560 1352 Retenciones.exe 28 PID 1352 wrote to memory of 1560 1352 Retenciones.exe 28 PID 1352 wrote to memory of 1560 1352 Retenciones.exe 28 PID 1352 wrote to memory of 1560 1352 Retenciones.exe 28 PID 1352 wrote to memory of 1560 1352 Retenciones.exe 28