Analysis
-
max time kernel
150s -
max time network
133s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
03/11/2023, 12:41
Static task
static1
Behavioral task
behavioral1
Sample
0d873ed56f2349a5376a64def6871174da51b3823f82eeae1cb33384ed73a3b1.exe
Resource
win10-20231020-en
General
-
Target
0d873ed56f2349a5376a64def6871174da51b3823f82eeae1cb33384ed73a3b1.exe
-
Size
5.6MB
-
MD5
f75e9da2c82a953ee967f6345c131222
-
SHA1
22d3fcaff73227a2bcee7f0d90da208fa3239754
-
SHA256
0d873ed56f2349a5376a64def6871174da51b3823f82eeae1cb33384ed73a3b1
-
SHA512
5d89bd1e3422bedc3a5b2f7f7fcb6d43c7cd6f10307fb07256d7a9804a24a251f3e1680445b2576222ef53a9e54ea558500b765e974c5855e144b9179cd99e61
-
SSDEEP
98304:odLMskdar5pAyer48E7mGs4rhmt0djoq1y4HgksEmaYJGN1H//SFlM2PXNpUuq11:oGspAyNH7mGs4k+jl13eaYCHMPUuqE7e
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 772 is-3T3RU.tmp 1076 ABuster.exe 4408 ABuster.exe -
Loads dropped DLL 3 IoCs
pid Process 772 is-3T3RU.tmp 772 is-3T3RU.tmp 772 is-3T3RU.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 51.159.66.125 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 34 IoCs
description ioc Process File created C:\Program Files (x86)\ABuster\Lang\is-ATJ3O.tmp is-3T3RU.tmp File created C:\Program Files (x86)\ABuster\Plugins\is-P8IPV.tmp is-3T3RU.tmp File created C:\Program Files (x86)\ABuster\is-4M0IK.tmp is-3T3RU.tmp File created C:\Program Files (x86)\ABuster\Lang\is-97IA5.tmp is-3T3RU.tmp File created C:\Program Files (x86)\ABuster\Lang\is-3L57L.tmp is-3T3RU.tmp File created C:\Program Files (x86)\ABuster\Lang\is-9C65K.tmp is-3T3RU.tmp File created C:\Program Files (x86)\ABuster\is-PRQSC.tmp is-3T3RU.tmp File created C:\Program Files (x86)\ABuster\Lang\is-SJE0C.tmp is-3T3RU.tmp File created C:\Program Files (x86)\ABuster\Lang\is-EVPEB.tmp is-3T3RU.tmp File created C:\Program Files (x86)\ABuster\Plugins\is-2IQVR.tmp is-3T3RU.tmp File opened for modification C:\Program Files (x86)\ABuster\ABuster.exe is-3T3RU.tmp File created C:\Program Files (x86)\ABuster\unins000.dat is-3T3RU.tmp File created C:\Program Files (x86)\ABuster\Lang\is-ATU75.tmp is-3T3RU.tmp File created C:\Program Files (x86)\ABuster\Online\is-GDGSB.tmp is-3T3RU.tmp File created C:\Program Files (x86)\ABuster\Plugins\is-KLVSL.tmp is-3T3RU.tmp File created C:\Program Files (x86)\ABuster\Lang\is-MCVN1.tmp is-3T3RU.tmp File created C:\Program Files (x86)\ABuster\Lang\is-5J4LD.tmp is-3T3RU.tmp File created C:\Program Files (x86)\ABuster\Plugins\is-U3RTE.tmp is-3T3RU.tmp File created C:\Program Files (x86)\ABuster\Lang\is-QFMLK.tmp is-3T3RU.tmp File created C:\Program Files (x86)\ABuster\Lang\is-I454T.tmp is-3T3RU.tmp File created C:\Program Files (x86)\ABuster\Lang\is-OAB51.tmp is-3T3RU.tmp File created C:\Program Files (x86)\ABuster\Lang\is-1OJQ3.tmp is-3T3RU.tmp File created C:\Program Files (x86)\ABuster\Lang\is-MPF9D.tmp is-3T3RU.tmp File created C:\Program Files (x86)\ABuster\Lang\is-2QN0C.tmp is-3T3RU.tmp File created C:\Program Files (x86)\ABuster\Lang\is-K4AIC.tmp is-3T3RU.tmp File created C:\Program Files (x86)\ABuster\Lang\is-PDT0B.tmp is-3T3RU.tmp File created C:\Program Files (x86)\ABuster\Lang\is-101S0.tmp is-3T3RU.tmp File created C:\Program Files (x86)\ABuster\Help\is-HBLOR.tmp is-3T3RU.tmp File created C:\Program Files (x86)\ABuster\Lang\is-TUOF0.tmp is-3T3RU.tmp File created C:\Program Files (x86)\ABuster\Lang\is-E0R3L.tmp is-3T3RU.tmp File created C:\Program Files (x86)\ABuster\Lang\is-VRVQD.tmp is-3T3RU.tmp File created C:\Program Files (x86)\ABuster\Online\is-B57AM.tmp is-3T3RU.tmp File opened for modification C:\Program Files (x86)\ABuster\unins000.dat is-3T3RU.tmp File created C:\Program Files (x86)\ABuster\Lang\is-336N0.tmp is-3T3RU.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4516 wrote to memory of 772 4516 0d873ed56f2349a5376a64def6871174da51b3823f82eeae1cb33384ed73a3b1.exe 70 PID 4516 wrote to memory of 772 4516 0d873ed56f2349a5376a64def6871174da51b3823f82eeae1cb33384ed73a3b1.exe 70 PID 4516 wrote to memory of 772 4516 0d873ed56f2349a5376a64def6871174da51b3823f82eeae1cb33384ed73a3b1.exe 70 PID 772 wrote to memory of 668 772 is-3T3RU.tmp 71 PID 772 wrote to memory of 668 772 is-3T3RU.tmp 71 PID 772 wrote to memory of 668 772 is-3T3RU.tmp 71 PID 772 wrote to memory of 1076 772 is-3T3RU.tmp 73 PID 772 wrote to memory of 1076 772 is-3T3RU.tmp 73 PID 772 wrote to memory of 1076 772 is-3T3RU.tmp 73 PID 668 wrote to memory of 3508 668 net.exe 74 PID 668 wrote to memory of 3508 668 net.exe 74 PID 668 wrote to memory of 3508 668 net.exe 74 PID 772 wrote to memory of 4408 772 is-3T3RU.tmp 75 PID 772 wrote to memory of 4408 772 is-3T3RU.tmp 75 PID 772 wrote to memory of 4408 772 is-3T3RU.tmp 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d873ed56f2349a5376a64def6871174da51b3823f82eeae1cb33384ed73a3b1.exe"C:\Users\Admin\AppData\Local\Temp\0d873ed56f2349a5376a64def6871174da51b3823f82eeae1cb33384ed73a3b1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\is-17062.tmp\is-3T3RU.tmp"C:\Users\Admin\AppData\Local\Temp\is-17062.tmp\is-3T3RU.tmp" /SL4 $8021C "C:\Users\Admin\AppData\Local\Temp\0d873ed56f2349a5376a64def6871174da51b3823f82eeae1cb33384ed73a3b1.exe" 5511751 793602⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 33⤵
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 34⤵PID:3508
-
-
-
C:\Program Files (x86)\ABuster\ABuster.exe"C:\Program Files (x86)\ABuster\ABuster.exe" -i3⤵
- Executes dropped EXE
PID:1076
-
-
C:\Program Files (x86)\ABuster\ABuster.exe"C:\Program Files (x86)\ABuster\ABuster.exe" -s3⤵
- Executes dropped EXE
PID:4408
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.8MB
MD51345f03a935da4ff1df5956ef99046fa
SHA1207b46527929c26399d7e999cc7fbb0f88a19cef
SHA256eadb9e5bb4b1af014ebd89bc01e65c14acc86962476328c04b8aa9ce1305c83e
SHA512e306ceda5b5b7f856bbb99aaa46671862e01e71999ac5237db860a7129f81734d505da61710c49b3345327d61973fa7f2f83f72499c1cd44e4e5a2b7e1cb42d1
-
Filesize
3.8MB
MD51345f03a935da4ff1df5956ef99046fa
SHA1207b46527929c26399d7e999cc7fbb0f88a19cef
SHA256eadb9e5bb4b1af014ebd89bc01e65c14acc86962476328c04b8aa9ce1305c83e
SHA512e306ceda5b5b7f856bbb99aaa46671862e01e71999ac5237db860a7129f81734d505da61710c49b3345327d61973fa7f2f83f72499c1cd44e4e5a2b7e1cb42d1
-
Filesize
3.8MB
MD51345f03a935da4ff1df5956ef99046fa
SHA1207b46527929c26399d7e999cc7fbb0f88a19cef
SHA256eadb9e5bb4b1af014ebd89bc01e65c14acc86962476328c04b8aa9ce1305c83e
SHA512e306ceda5b5b7f856bbb99aaa46671862e01e71999ac5237db860a7129f81734d505da61710c49b3345327d61973fa7f2f83f72499c1cd44e4e5a2b7e1cb42d1
-
Filesize
643KB
MD5a991510c12f20ccf8a5231a32a7958c3
SHA1122724d1a4fdea39af3aa427e4941158d7e91dfa
SHA2560c3ab280e156e9ff6a325267bc5d721f71dcb12490a53a03a033d932272f9198
SHA5128f387a6189f6fa51f84004706589ed1706dfd08dfc38c1f8ce3ce010f37efac085fd241396ab69bc25c86174a4637492163bf3cb26f88639551dc9fa0c52eafa
-
Filesize
643KB
MD5a991510c12f20ccf8a5231a32a7958c3
SHA1122724d1a4fdea39af3aa427e4941158d7e91dfa
SHA2560c3ab280e156e9ff6a325267bc5d721f71dcb12490a53a03a033d932272f9198
SHA5128f387a6189f6fa51f84004706589ed1706dfd08dfc38c1f8ce3ce010f37efac085fd241396ab69bc25c86174a4637492163bf3cb26f88639551dc9fa0c52eafa
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
Filesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4