Analysis
-
max time kernel
159s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 17:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
80d5a0defa331caea1ebe788bf1dc116.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
General
-
Target
80d5a0defa331caea1ebe788bf1dc116.exe
-
Size
4.1MB
-
MD5
80d5a0defa331caea1ebe788bf1dc116
-
SHA1
471408a3a30f345e70e40ec306e99bf514b30726
-
SHA256
d3a486d3b032834b1203adefd25d0bf0b36fae7f9e72071c21ccc266e1e1f893
-
SHA512
82f3cf4cde2f2d96673f1de63216a369520493889329d38b2a688f89446a0350fbc200a83c172deefdaa20f9f44bc388762484718dfb50212ba825bd5c3227dd
-
SSDEEP
49152:qdVNhdTN5cWr9GnzpMZ/eKL4cJtkNu/ugum94gDxNLtdHvhkIpxVVEZGZapnhlkD:qdVNxkKeW424u/ug9DVSdlYg7mrPiVo
Malware Config
Extracted
Family
rustybuer
C2
https://karbotza.com/
Signatures
-
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
secinit.exedescription ioc process File opened (read-only) \??\g: secinit.exe File opened (read-only) \??\I: secinit.exe File opened (read-only) \??\j: secinit.exe File opened (read-only) \??\M: secinit.exe File opened (read-only) \??\T: secinit.exe File opened (read-only) \??\V: secinit.exe File opened (read-only) \??\A: secinit.exe File opened (read-only) \??\b: secinit.exe File opened (read-only) \??\e: secinit.exe File opened (read-only) \??\G: secinit.exe File opened (read-only) \??\h: secinit.exe File opened (read-only) \??\N: secinit.exe File opened (read-only) \??\p: secinit.exe File opened (read-only) \??\s: secinit.exe File opened (read-only) \??\v: secinit.exe File opened (read-only) \??\w: secinit.exe File opened (read-only) \??\W: secinit.exe File opened (read-only) \??\x: secinit.exe File opened (read-only) \??\z: secinit.exe File opened (read-only) \??\a: secinit.exe File opened (read-only) \??\F: secinit.exe File opened (read-only) \??\H: secinit.exe File opened (read-only) \??\n: secinit.exe File opened (read-only) \??\y: secinit.exe File opened (read-only) \??\Y: secinit.exe File opened (read-only) \??\Z: secinit.exe File opened (read-only) \??\q: secinit.exe File opened (read-only) \??\Q: secinit.exe File opened (read-only) \??\r: secinit.exe File opened (read-only) \??\S: secinit.exe File opened (read-only) \??\X: secinit.exe File opened (read-only) \??\B: secinit.exe File opened (read-only) \??\J: secinit.exe File opened (read-only) \??\O: secinit.exe File opened (read-only) \??\P: secinit.exe File opened (read-only) \??\U: secinit.exe File opened (read-only) \??\k: secinit.exe File opened (read-only) \??\u: secinit.exe File opened (read-only) \??\D: secinit.exe File opened (read-only) \??\i: secinit.exe File opened (read-only) \??\o: secinit.exe File opened (read-only) \??\R: secinit.exe File opened (read-only) \??\E: secinit.exe File opened (read-only) \??\K: secinit.exe File opened (read-only) \??\l: secinit.exe File opened (read-only) \??\L: secinit.exe File opened (read-only) \??\m: secinit.exe File opened (read-only) \??\t: secinit.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
80d5a0defa331caea1ebe788bf1dc116.exedescription pid process target process PID 3568 set thread context of 1984 3568 80d5a0defa331caea1ebe788bf1dc116.exe secinit.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
secinit.exepid process 1984 secinit.exe 1984 secinit.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
80d5a0defa331caea1ebe788bf1dc116.exedescription pid process target process PID 3568 wrote to memory of 1984 3568 80d5a0defa331caea1ebe788bf1dc116.exe secinit.exe PID 3568 wrote to memory of 1984 3568 80d5a0defa331caea1ebe788bf1dc116.exe secinit.exe PID 3568 wrote to memory of 1984 3568 80d5a0defa331caea1ebe788bf1dc116.exe secinit.exe PID 3568 wrote to memory of 1984 3568 80d5a0defa331caea1ebe788bf1dc116.exe secinit.exe PID 3568 wrote to memory of 1984 3568 80d5a0defa331caea1ebe788bf1dc116.exe secinit.exe PID 3568 wrote to memory of 1984 3568 80d5a0defa331caea1ebe788bf1dc116.exe secinit.exe PID 3568 wrote to memory of 1984 3568 80d5a0defa331caea1ebe788bf1dc116.exe secinit.exe PID 3568 wrote to memory of 1984 3568 80d5a0defa331caea1ebe788bf1dc116.exe secinit.exe PID 3568 wrote to memory of 1984 3568 80d5a0defa331caea1ebe788bf1dc116.exe secinit.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\80d5a0defa331caea1ebe788bf1dc116.exe"C:\Users\Admin\AppData\Local\Temp\80d5a0defa331caea1ebe788bf1dc116.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\SysWOW64\secinit.exe"C:\Windows\System32\secinit.exe"2⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
PID:1984
-