Analysis
-
max time kernel
599s -
max time network
560s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
22-06-2023 13:11
Static task
static1
Behavioral task
behavioral1
Sample
Envio de pago.exe
Resource
win7-20230621-en
5 signatures
600 seconds
General
-
Target
Envio de pago.exe
-
Size
5.9MB
-
MD5
186de479f8aaff2ed18aac1acf54b591
-
SHA1
84c43ddbd5eed1dac30374ac44cebb0adf1b52e8
-
SHA256
83b4e3a3f52a7fae6ca3ca2a955a6e1b13e9769248cb75b8561b5d60c26a18a0
-
SHA512
e88821331ff02e0b96769e9314291f920a0bb8d04bc7224dcd5638c3e11247203ed9d00ddbcd02e32368ef36175593fd475f50191092b65e1befd0544fe32c48
-
SSDEEP
49152:JFQPSP5e1ObxxpYflUaqtuu49nVaD/4H0lzDvQFEqLuhXJxs9Rp0D5zKDOmaQShr:JaPfe
Malware Config
Extracted
Family
bandook
C2
humut.su
Signatures
-
Bandook payload 8 IoCs
resource yara_rule behavioral1/memory/112-98-0x0000000013140000-0x0000000014751000-memory.dmp family_bandook behavioral1/memory/112-99-0x0000000013140000-0x0000000014751000-memory.dmp family_bandook behavioral1/memory/112-100-0x0000000013140000-0x0000000014751000-memory.dmp family_bandook behavioral1/memory/112-101-0x0000000013140000-0x0000000014751000-memory.dmp family_bandook behavioral1/memory/112-102-0x0000000013140000-0x0000000014751000-memory.dmp family_bandook behavioral1/memory/112-104-0x0000000013140000-0x0000000014751000-memory.dmp family_bandook behavioral1/memory/112-106-0x0000000013140000-0x0000000014751000-memory.dmp family_bandook behavioral1/memory/112-112-0x0000000013140000-0x0000000014751000-memory.dmp family_bandook -
resource yara_rule behavioral1/memory/112-96-0x0000000013140000-0x0000000014751000-memory.dmp upx behavioral1/memory/112-97-0x0000000013140000-0x0000000014751000-memory.dmp upx behavioral1/memory/112-98-0x0000000013140000-0x0000000014751000-memory.dmp upx behavioral1/memory/112-99-0x0000000013140000-0x0000000014751000-memory.dmp upx behavioral1/memory/112-100-0x0000000013140000-0x0000000014751000-memory.dmp upx behavioral1/memory/112-101-0x0000000013140000-0x0000000014751000-memory.dmp upx behavioral1/memory/112-102-0x0000000013140000-0x0000000014751000-memory.dmp upx behavioral1/memory/112-104-0x0000000013140000-0x0000000014751000-memory.dmp upx behavioral1/memory/112-106-0x0000000013140000-0x0000000014751000-memory.dmp upx behavioral1/memory/112-112-0x0000000013140000-0x0000000014751000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 112 msinfo32.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1244 wrote to memory of 112 1244 Envio de pago.exe 28 PID 1244 wrote to memory of 112 1244 Envio de pago.exe 28 PID 1244 wrote to memory of 112 1244 Envio de pago.exe 28 PID 1244 wrote to memory of 112 1244 Envio de pago.exe 28 PID 1244 wrote to memory of 900 1244 Envio de pago.exe 29 PID 1244 wrote to memory of 900 1244 Envio de pago.exe 29 PID 1244 wrote to memory of 900 1244 Envio de pago.exe 29 PID 1244 wrote to memory of 900 1244 Envio de pago.exe 29 PID 1244 wrote to memory of 112 1244 Envio de pago.exe 28 PID 1244 wrote to memory of 112 1244 Envio de pago.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Envio de pago.exe"C:\Users\Admin\AppData\Local\Temp\Envio de pago.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\windows\syswow64\msinfo32.exeC:\windows\syswow64\msinfo32.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:112
-
-
C:\Users\Admin\AppData\Local\Temp\Envio de pago.exe"C:\Users\Admin\AppData\Local\Temp\Envio de pago.exe" ooooooooooooooo2⤵PID:900
-