Analysis
-
max time kernel
390s -
max time network
379s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
04-09-2023 10:54
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Factura_de_pago#0101.exe
Resource
win7-20230831-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
Factura_de_pago#0101.exe
Resource
win10v2004-20230831-en
windows10-2004-x64
0 signatures
150 seconds
General
-
Target
Factura_de_pago#0101.exe
-
Size
10.3MB
-
MD5
3ca635e112a87190cc373651c35f65d3
-
SHA1
f7e87f471c5ef778771c3e8d14c4085550aac79a
-
SHA256
981833615556263d376335312e04dcda5204a489a8362a8e7f69dd0c92cbe7c0
-
SHA512
1fbff3366a83d34348697402b547972ea9165b55a5f441ede973a6777eb25093991099105493d1d41f2634d5873475342485d353414676c377f4771f781804e9
-
SSDEEP
49152:lRyNxSzbVQ8KjAEmNP7XZPGA+DBo6ZZbi/ogWokoimnR2B+8J+E9g1Vr/1FhOsjH:lRe
Malware Config
Extracted
Family
bandook
C2
185.10.68.52
Signatures
-
Bandook payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/2660-46-0x0000000013140000-0x000000001468A000-memory.dmp family_bandook behavioral1/memory/2660-45-0x0000000013140000-0x000000001468A000-memory.dmp family_bandook behavioral1/memory/2660-47-0x0000000013140000-0x000000001468A000-memory.dmp family_bandook behavioral1/memory/2660-48-0x0000000013140000-0x000000001468A000-memory.dmp family_bandook behavioral1/memory/2660-49-0x0000000013140000-0x000000001468A000-memory.dmp family_bandook behavioral1/memory/2660-51-0x0000000013140000-0x000000001468A000-memory.dmp family_bandook behavioral1/memory/2660-53-0x0000000013140000-0x000000001468A000-memory.dmp family_bandook -
Processes:
resource yara_rule behavioral1/memory/2660-43-0x0000000013140000-0x000000001468A000-memory.dmp upx behavioral1/memory/2660-44-0x0000000013140000-0x000000001468A000-memory.dmp upx behavioral1/memory/2660-46-0x0000000013140000-0x000000001468A000-memory.dmp upx behavioral1/memory/2660-45-0x0000000013140000-0x000000001468A000-memory.dmp upx behavioral1/memory/2660-47-0x0000000013140000-0x000000001468A000-memory.dmp upx behavioral1/memory/2660-48-0x0000000013140000-0x000000001468A000-memory.dmp upx behavioral1/memory/2660-49-0x0000000013140000-0x000000001468A000-memory.dmp upx behavioral1/memory/2660-51-0x0000000013140000-0x000000001468A000-memory.dmp upx behavioral1/memory/2660-53-0x0000000013140000-0x000000001468A000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
msinfo32.exepid process 2660 msinfo32.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
Factura_de_pago#0101.exedescription pid process target process PID 2044 wrote to memory of 2660 2044 Factura_de_pago#0101.exe msinfo32.exe PID 2044 wrote to memory of 2660 2044 Factura_de_pago#0101.exe msinfo32.exe PID 2044 wrote to memory of 2660 2044 Factura_de_pago#0101.exe msinfo32.exe PID 2044 wrote to memory of 2660 2044 Factura_de_pago#0101.exe msinfo32.exe PID 2044 wrote to memory of 2536 2044 Factura_de_pago#0101.exe Factura_de_pago#0101.exe PID 2044 wrote to memory of 2536 2044 Factura_de_pago#0101.exe Factura_de_pago#0101.exe PID 2044 wrote to memory of 2536 2044 Factura_de_pago#0101.exe Factura_de_pago#0101.exe PID 2044 wrote to memory of 2536 2044 Factura_de_pago#0101.exe Factura_de_pago#0101.exe PID 2044 wrote to memory of 2660 2044 Factura_de_pago#0101.exe msinfo32.exe PID 2044 wrote to memory of 2660 2044 Factura_de_pago#0101.exe msinfo32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Factura_de_pago#0101.exe"C:\Users\Admin\AppData\Local\Temp\Factura_de_pago#0101.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\windows\syswow64\msinfo32.exeC:\windows\syswow64\msinfo32.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2660
-
-
C:\Users\Admin\AppData\Local\Temp\Factura_de_pago#0101.exeC:\Users\Admin\AppData\Local\Temp\Factura_de_pago#0101.exe ooooooooooooooo2⤵PID:2536
-