Analysis
-
max time kernel
599s -
max time network
580s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2023 21:05
Static task
static1
General
-
Target
Nuevo_Documento2607.pdf.exe
-
Size
6.9MB
-
MD5
c688b50e5b47539ab29e4e748737391a
-
SHA1
24f9be8db519190abdeb4e211c5be863c31f349d
-
SHA256
7fccc0fd1db4123276163e62b4b152efaebe17228a72e1d91cc0109a61a247be
-
SHA512
af672fa317e62e32cd500567910501f00b693549cc7b1d120830b0c7754f3a86df4b435998f14259da268e4a2ea5cc40e324875a4dd3f7399c738360fabb37fd
-
SSDEEP
49152:YW1L/cM04WxPi0ooPGpFA0k2spoDAffLPnwTaxcKotmQk1s/6wXSsT1pRb/Ce9vK:YW1LkM0v
Malware Config
Extracted
Family
bandook
C2
185.10.68.52
Signatures
-
Bandook payload 14 IoCs
resource yara_rule behavioral1/memory/2012-175-0x0000000013140000-0x00000000140F0000-memory.dmp family_bandook behavioral1/memory/2012-177-0x0000000013140000-0x00000000140F0000-memory.dmp family_bandook behavioral1/memory/2012-178-0x0000000013140000-0x00000000140F0000-memory.dmp family_bandook behavioral1/memory/2012-179-0x0000000013140000-0x00000000140F0000-memory.dmp family_bandook behavioral1/memory/2012-181-0x0000000013140000-0x00000000140F0000-memory.dmp family_bandook behavioral1/memory/2012-183-0x0000000013140000-0x00000000140F0000-memory.dmp family_bandook behavioral1/memory/2012-187-0x0000000013140000-0x00000000140F0000-memory.dmp family_bandook behavioral1/memory/2012-191-0x0000000013140000-0x00000000140F0000-memory.dmp family_bandook behavioral1/memory/2012-192-0x0000000013140000-0x00000000140F0000-memory.dmp family_bandook behavioral1/memory/2012-193-0x0000000013140000-0x00000000140F0000-memory.dmp family_bandook behavioral1/memory/2012-195-0x0000000013140000-0x00000000140F0000-memory.dmp family_bandook behavioral1/memory/2012-196-0x0000000013140000-0x00000000140F0000-memory.dmp family_bandook behavioral1/memory/2012-198-0x0000000013140000-0x00000000140F0000-memory.dmp family_bandook behavioral1/memory/2012-201-0x0000000013140000-0x00000000140F0000-memory.dmp family_bandook -
resource yara_rule behavioral1/memory/2012-172-0x0000000013140000-0x00000000140F0000-memory.dmp upx behavioral1/memory/2012-174-0x0000000013140000-0x00000000140F0000-memory.dmp upx behavioral1/memory/2012-175-0x0000000013140000-0x00000000140F0000-memory.dmp upx behavioral1/memory/2012-176-0x0000000013140000-0x00000000140F0000-memory.dmp upx behavioral1/memory/2012-177-0x0000000013140000-0x00000000140F0000-memory.dmp upx behavioral1/memory/2012-178-0x0000000013140000-0x00000000140F0000-memory.dmp upx behavioral1/memory/2012-179-0x0000000013140000-0x00000000140F0000-memory.dmp upx behavioral1/memory/2012-181-0x0000000013140000-0x00000000140F0000-memory.dmp upx behavioral1/memory/2012-183-0x0000000013140000-0x00000000140F0000-memory.dmp upx behavioral1/memory/2012-187-0x0000000013140000-0x00000000140F0000-memory.dmp upx behavioral1/memory/2012-191-0x0000000013140000-0x00000000140F0000-memory.dmp upx behavioral1/memory/2012-192-0x0000000013140000-0x00000000140F0000-memory.dmp upx behavioral1/memory/2012-193-0x0000000013140000-0x00000000140F0000-memory.dmp upx behavioral1/memory/2012-195-0x0000000013140000-0x00000000140F0000-memory.dmp upx behavioral1/memory/2012-196-0x0000000013140000-0x00000000140F0000-memory.dmp upx behavioral1/memory/2012-198-0x0000000013140000-0x00000000140F0000-memory.dmp upx behavioral1/memory/2012-201-0x0000000013140000-0x00000000140F0000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2012 msinfo32.exe 2012 msinfo32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4180 wrote to memory of 2012 4180 Nuevo_Documento2607.pdf.exe 105 PID 4180 wrote to memory of 2012 4180 Nuevo_Documento2607.pdf.exe 105 PID 4180 wrote to memory of 2012 4180 Nuevo_Documento2607.pdf.exe 105 PID 4180 wrote to memory of 2860 4180 Nuevo_Documento2607.pdf.exe 106 PID 4180 wrote to memory of 2860 4180 Nuevo_Documento2607.pdf.exe 106 PID 4180 wrote to memory of 2860 4180 Nuevo_Documento2607.pdf.exe 106 PID 4180 wrote to memory of 2012 4180 Nuevo_Documento2607.pdf.exe 105 PID 4180 wrote to memory of 2012 4180 Nuevo_Documento2607.pdf.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\Nuevo_Documento2607.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Nuevo_Documento2607.pdf.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\windows\SysWOW64\msinfo32.exeC:\windows\syswow64\msinfo32.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2012
-
-
C:\Users\Admin\AppData\Local\Temp\Nuevo_Documento2607.pdf.exeC:\Users\Admin\AppData\Local\Temp\Nuevo_Documento2607.pdf.exe ooooooooooooooo2⤵PID:2860
-