Analysis
-
max time kernel
299s -
max time network
267s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
30-04-2023 08:24
Static task
static1
Behavioral task
behavioral1
Sample
REPORTE DE PAGO-1.exe
Resource
win7-20230220-en
5 signatures
300 seconds
General
-
Target
REPORTE DE PAGO-1.exe
-
Size
2.6MB
-
MD5
ef51568300ae7e7c78e27e5503a4f955
-
SHA1
c54415dadc7fa711122d92963d9d3823637b2b99
-
SHA256
34bc03f62cce398c53c910f9c2c3aae2d081417a82f744c09426ff29525eda82
-
SHA512
f18c10e979d7a962cd38dd399bed1258b429adc92ca19c38788691a8f851efbfebdcadd7c600b64573b34b7e12c67140862d91304251fc0e9b1a25106cafec88
-
SSDEEP
49152:RfEMHawa0Tns5D2b0+XFUlJ1qVNVWDawSmpwjw2e:Rq
Malware Config
Extracted
Family
bandook
C2
deapproved.ru
Signatures
-
Bandook payload 8 IoCs
resource yara_rule behavioral2/memory/4372-157-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral2/memory/4372-156-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral2/memory/4372-158-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral2/memory/4372-159-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral2/memory/4372-160-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral2/memory/4372-162-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral2/memory/4372-164-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral2/memory/4372-168-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook -
resource yara_rule behavioral2/memory/4372-153-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral2/memory/4372-154-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral2/memory/4372-157-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral2/memory/4372-156-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral2/memory/4372-158-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral2/memory/4372-159-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral2/memory/4372-160-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral2/memory/4372-162-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral2/memory/4372-164-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral2/memory/4372-168-0x0000000013140000-0x0000000014009000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4372 msinfo32.exe 4372 msinfo32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4416 wrote to memory of 4372 4416 REPORTE DE PAGO-1.exe 91 PID 4416 wrote to memory of 4372 4416 REPORTE DE PAGO-1.exe 91 PID 4416 wrote to memory of 4372 4416 REPORTE DE PAGO-1.exe 91 PID 4416 wrote to memory of 860 4416 REPORTE DE PAGO-1.exe 92 PID 4416 wrote to memory of 860 4416 REPORTE DE PAGO-1.exe 92 PID 4416 wrote to memory of 860 4416 REPORTE DE PAGO-1.exe 92 PID 4416 wrote to memory of 4372 4416 REPORTE DE PAGO-1.exe 91 PID 4416 wrote to memory of 4372 4416 REPORTE DE PAGO-1.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\REPORTE DE PAGO-1.exe"C:\Users\Admin\AppData\Local\Temp\REPORTE DE PAGO-1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\windows\SysWOW64\msinfo32.exeC:\windows\syswow64\msinfo32.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4372
-
-
C:\Users\Admin\AppData\Local\Temp\REPORTE DE PAGO-1.exe"C:\Users\Admin\AppData\Local\Temp\REPORTE DE PAGO-1.exe" ooooooooooooooo2⤵PID:860
-