Analysis
-
max time kernel
296s -
max time network
267s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
30-04-2023 08:24
Static task
static1
Behavioral task
behavioral1
Sample
REPORTE DE PAGO-1.exe
Resource
win7-20230220-en
windows7-x64
5 signatures
300 seconds
General
-
Target
REPORTE DE PAGO-1.exe
-
Size
2.6MB
-
MD5
ef51568300ae7e7c78e27e5503a4f955
-
SHA1
c54415dadc7fa711122d92963d9d3823637b2b99
-
SHA256
34bc03f62cce398c53c910f9c2c3aae2d081417a82f744c09426ff29525eda82
-
SHA512
f18c10e979d7a962cd38dd399bed1258b429adc92ca19c38788691a8f851efbfebdcadd7c600b64573b34b7e12c67140862d91304251fc0e9b1a25106cafec88
-
SSDEEP
49152:RfEMHawa0Tns5D2b0+XFUlJ1qVNVWDawSmpwjw2e:Rq
Malware Config
Signatures
-
Bandook payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/604-80-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral1/memory/604-81-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral1/memory/604-91-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral1/memory/604-92-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral1/memory/604-93-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral1/memory/604-95-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral1/memory/604-99-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook -
Processes:
resource yara_rule behavioral1/memory/604-78-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/604-79-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/604-80-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/604-81-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/604-91-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/604-92-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/604-93-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/604-95-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/604-99-0x0000000013140000-0x0000000014009000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
msinfo32.exepid process 604 msinfo32.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
REPORTE DE PAGO-1.exedescription pid process target process PID 860 wrote to memory of 604 860 REPORTE DE PAGO-1.exe msinfo32.exe PID 860 wrote to memory of 604 860 REPORTE DE PAGO-1.exe msinfo32.exe PID 860 wrote to memory of 604 860 REPORTE DE PAGO-1.exe msinfo32.exe PID 860 wrote to memory of 604 860 REPORTE DE PAGO-1.exe msinfo32.exe PID 860 wrote to memory of 1496 860 REPORTE DE PAGO-1.exe REPORTE DE PAGO-1.exe PID 860 wrote to memory of 1496 860 REPORTE DE PAGO-1.exe REPORTE DE PAGO-1.exe PID 860 wrote to memory of 1496 860 REPORTE DE PAGO-1.exe REPORTE DE PAGO-1.exe PID 860 wrote to memory of 1496 860 REPORTE DE PAGO-1.exe REPORTE DE PAGO-1.exe PID 860 wrote to memory of 604 860 REPORTE DE PAGO-1.exe msinfo32.exe PID 860 wrote to memory of 604 860 REPORTE DE PAGO-1.exe msinfo32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\REPORTE DE PAGO-1.exe"C:\Users\Admin\AppData\Local\Temp\REPORTE DE PAGO-1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:860 -
C:\windows\syswow64\msinfo32.exeC:\windows\syswow64\msinfo32.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:604
-
-
C:\Users\Admin\AppData\Local\Temp\REPORTE DE PAGO-1.exe"C:\Users\Admin\AppData\Local\Temp\REPORTE DE PAGO-1.exe" ooooooooooooooo2⤵PID:1496
-