Analysis
-
max time kernel
441s -
max time network
444s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2023 13:44
Static task
static1
General
-
Target
Factura de Cobro.exe
-
Size
7.5MB
-
MD5
c46c3de7dc67087e6007a1cc6d24abf1
-
SHA1
5e4edbe4d3206ea8dbba05f575a4a9312289591d
-
SHA256
aafafcec219765dbf2a4d4db4ecccd7d7b5bcc44613e80d833812dd9d074f434
-
SHA512
6f8d11131fb959046e57397dc76d342fe6ff8621764a84affbb4d52c63aef4dd123adc351f7c93c3d69233255c78045008339345569a1056a6b4f9a1af69ada6
-
SSDEEP
49152:CFQPSP5e3Ch3dKpJtxHe3AlDxZt4UUlAbisGOa3onvtkOsKmqggjrzVS+hG7mrOR:CaPfIH
Malware Config
Extracted
Family
bandook
C2
185.10.68.52
Signatures
-
Bandook payload 8 IoCs
resource yara_rule behavioral1/memory/1096-176-0x0000000013140000-0x0000000014663000-memory.dmp family_bandook behavioral1/memory/1096-175-0x0000000013140000-0x0000000014663000-memory.dmp family_bandook behavioral1/memory/1096-177-0x0000000013140000-0x0000000014663000-memory.dmp family_bandook behavioral1/memory/1096-178-0x0000000013140000-0x0000000014663000-memory.dmp family_bandook behavioral1/memory/1096-180-0x0000000013140000-0x0000000014663000-memory.dmp family_bandook behavioral1/memory/1096-181-0x0000000013140000-0x0000000014663000-memory.dmp family_bandook behavioral1/memory/1096-183-0x0000000013140000-0x0000000014663000-memory.dmp family_bandook behavioral1/memory/1096-187-0x0000000013140000-0x0000000014663000-memory.dmp family_bandook -
resource yara_rule behavioral1/memory/1096-172-0x0000000013140000-0x0000000014663000-memory.dmp upx behavioral1/memory/1096-174-0x0000000013140000-0x0000000014663000-memory.dmp upx behavioral1/memory/1096-176-0x0000000013140000-0x0000000014663000-memory.dmp upx behavioral1/memory/1096-175-0x0000000013140000-0x0000000014663000-memory.dmp upx behavioral1/memory/1096-177-0x0000000013140000-0x0000000014663000-memory.dmp upx behavioral1/memory/1096-178-0x0000000013140000-0x0000000014663000-memory.dmp upx behavioral1/memory/1096-180-0x0000000013140000-0x0000000014663000-memory.dmp upx behavioral1/memory/1096-181-0x0000000013140000-0x0000000014663000-memory.dmp upx behavioral1/memory/1096-183-0x0000000013140000-0x0000000014663000-memory.dmp upx behavioral1/memory/1096-187-0x0000000013140000-0x0000000014663000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1096 msinfo32.exe 1096 msinfo32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4388 wrote to memory of 1096 4388 Factura de Cobro.exe 100 PID 4388 wrote to memory of 1096 4388 Factura de Cobro.exe 100 PID 4388 wrote to memory of 1096 4388 Factura de Cobro.exe 100 PID 4388 wrote to memory of 2440 4388 Factura de Cobro.exe 101 PID 4388 wrote to memory of 2440 4388 Factura de Cobro.exe 101 PID 4388 wrote to memory of 2440 4388 Factura de Cobro.exe 101 PID 4388 wrote to memory of 1096 4388 Factura de Cobro.exe 100 PID 4388 wrote to memory of 1096 4388 Factura de Cobro.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\Factura de Cobro.exe"C:\Users\Admin\AppData\Local\Temp\Factura de Cobro.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\windows\SysWOW64\msinfo32.exeC:\windows\syswow64\msinfo32.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1096
-
-
C:\Users\Admin\AppData\Local\Temp\Factura de Cobro.exe"C:\Users\Admin\AppData\Local\Temp\Factura de Cobro.exe" ooooooooooooooo2⤵PID:2440
-