Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 17:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
80d5a0defa331caea1ebe788bf1dc116.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
General
-
Target
80d5a0defa331caea1ebe788bf1dc116.exe
-
Size
4.1MB
-
MD5
80d5a0defa331caea1ebe788bf1dc116
-
SHA1
471408a3a30f345e70e40ec306e99bf514b30726
-
SHA256
d3a486d3b032834b1203adefd25d0bf0b36fae7f9e72071c21ccc266e1e1f893
-
SHA512
82f3cf4cde2f2d96673f1de63216a369520493889329d38b2a688f89446a0350fbc200a83c172deefdaa20f9f44bc388762484718dfb50212ba825bd5c3227dd
-
SSDEEP
49152:qdVNhdTN5cWr9GnzpMZ/eKL4cJtkNu/ugum94gDxNLtdHvhkIpxVVEZGZapnhlkD:qdVNxkKeW424u/ug9DVSdlYg7mrPiVo
Malware Config
Extracted
Family
rustybuer
C2
https://karbotza.com/
Signatures
-
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
secinit.exedescription ioc process File opened (read-only) \??\F: secinit.exe File opened (read-only) \??\O: secinit.exe File opened (read-only) \??\p: secinit.exe File opened (read-only) \??\S: secinit.exe File opened (read-only) \??\W: secinit.exe File opened (read-only) \??\Z: secinit.exe File opened (read-only) \??\B: secinit.exe File opened (read-only) \??\D: secinit.exe File opened (read-only) \??\g: secinit.exe File opened (read-only) \??\G: secinit.exe File opened (read-only) \??\i: secinit.exe File opened (read-only) \??\L: secinit.exe File opened (read-only) \??\o: secinit.exe File opened (read-only) \??\v: secinit.exe File opened (read-only) \??\e: secinit.exe File opened (read-only) \??\E: secinit.exe File opened (read-only) \??\P: secinit.exe File opened (read-only) \??\w: secinit.exe File opened (read-only) \??\A: secinit.exe File opened (read-only) \??\N: secinit.exe File opened (read-only) \??\Y: secinit.exe File opened (read-only) \??\m: secinit.exe File opened (read-only) \??\n: secinit.exe File opened (read-only) \??\r: secinit.exe File opened (read-only) \??\T: secinit.exe File opened (read-only) \??\u: secinit.exe File opened (read-only) \??\V: secinit.exe File opened (read-only) \??\a: secinit.exe File opened (read-only) \??\k: secinit.exe File opened (read-only) \??\R: secinit.exe File opened (read-only) \??\t: secinit.exe File opened (read-only) \??\x: secinit.exe File opened (read-only) \??\z: secinit.exe File opened (read-only) \??\b: secinit.exe File opened (read-only) \??\j: secinit.exe File opened (read-only) \??\K: secinit.exe File opened (read-only) \??\l: secinit.exe File opened (read-only) \??\M: secinit.exe File opened (read-only) \??\q: secinit.exe File opened (read-only) \??\s: secinit.exe File opened (read-only) \??\U: secinit.exe File opened (read-only) \??\h: secinit.exe File opened (read-only) \??\H: secinit.exe File opened (read-only) \??\X: secinit.exe File opened (read-only) \??\y: secinit.exe File opened (read-only) \??\Q: secinit.exe File opened (read-only) \??\I: secinit.exe File opened (read-only) \??\J: secinit.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
80d5a0defa331caea1ebe788bf1dc116.exedescription pid process target process PID 2232 set thread context of 2804 2232 80d5a0defa331caea1ebe788bf1dc116.exe secinit.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
secinit.exepid process 2804 secinit.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
80d5a0defa331caea1ebe788bf1dc116.exedescription pid process target process PID 2232 wrote to memory of 2804 2232 80d5a0defa331caea1ebe788bf1dc116.exe secinit.exe PID 2232 wrote to memory of 2804 2232 80d5a0defa331caea1ebe788bf1dc116.exe secinit.exe PID 2232 wrote to memory of 2804 2232 80d5a0defa331caea1ebe788bf1dc116.exe secinit.exe PID 2232 wrote to memory of 2804 2232 80d5a0defa331caea1ebe788bf1dc116.exe secinit.exe PID 2232 wrote to memory of 2804 2232 80d5a0defa331caea1ebe788bf1dc116.exe secinit.exe PID 2232 wrote to memory of 2804 2232 80d5a0defa331caea1ebe788bf1dc116.exe secinit.exe PID 2232 wrote to memory of 2804 2232 80d5a0defa331caea1ebe788bf1dc116.exe secinit.exe PID 2232 wrote to memory of 2804 2232 80d5a0defa331caea1ebe788bf1dc116.exe secinit.exe PID 2232 wrote to memory of 2804 2232 80d5a0defa331caea1ebe788bf1dc116.exe secinit.exe PID 2232 wrote to memory of 2804 2232 80d5a0defa331caea1ebe788bf1dc116.exe secinit.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\80d5a0defa331caea1ebe788bf1dc116.exe"C:\Users\Admin\AppData\Local\Temp\80d5a0defa331caea1ebe788bf1dc116.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\secinit.exe"C:\Windows\System32\secinit.exe"2⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
PID:2804
-