Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29-01-2024 20:50
Static task
static1
Behavioral task
behavioral1
Sample
80d5a0defa331caea1ebe788bf1dc116.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
80d5a0defa331caea1ebe788bf1dc116.exe
Resource
win10v2004-20231215-en
General
-
Target
80d5a0defa331caea1ebe788bf1dc116.exe
-
Size
4.1MB
-
MD5
80d5a0defa331caea1ebe788bf1dc116
-
SHA1
471408a3a30f345e70e40ec306e99bf514b30726
-
SHA256
d3a486d3b032834b1203adefd25d0bf0b36fae7f9e72071c21ccc266e1e1f893
-
SHA512
82f3cf4cde2f2d96673f1de63216a369520493889329d38b2a688f89446a0350fbc200a83c172deefdaa20f9f44bc388762484718dfb50212ba825bd5c3227dd
-
SSDEEP
49152:qdVNhdTN5cWr9GnzpMZ/eKL4cJtkNu/ugum94gDxNLtdHvhkIpxVVEZGZapnhlkD:qdVNxkKeW424u/ug9DVSdlYg7mrPiVo
Malware Config
Extracted
rustybuer
https://karbotza.com/
Signatures
-
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\g: secinit.exe File opened (read-only) \??\H: secinit.exe File opened (read-only) \??\U: secinit.exe File opened (read-only) \??\X: secinit.exe File opened (read-only) \??\y: secinit.exe File opened (read-only) \??\R: secinit.exe File opened (read-only) \??\S: secinit.exe File opened (read-only) \??\u: secinit.exe File opened (read-only) \??\a: secinit.exe File opened (read-only) \??\A: secinit.exe File opened (read-only) \??\h: secinit.exe File opened (read-only) \??\K: secinit.exe File opened (read-only) \??\q: secinit.exe File opened (read-only) \??\W: secinit.exe File opened (read-only) \??\i: secinit.exe File opened (read-only) \??\n: secinit.exe File opened (read-only) \??\p: secinit.exe File opened (read-only) \??\t: secinit.exe File opened (read-only) \??\m: secinit.exe File opened (read-only) \??\O: secinit.exe File opened (read-only) \??\z: secinit.exe File opened (read-only) \??\E: secinit.exe File opened (read-only) \??\F: secinit.exe File opened (read-only) \??\I: secinit.exe File opened (read-only) \??\J: secinit.exe File opened (read-only) \??\L: secinit.exe File opened (read-only) \??\B: secinit.exe File opened (read-only) \??\M: secinit.exe File opened (read-only) \??\N: secinit.exe File opened (read-only) \??\b: secinit.exe File opened (read-only) \??\D: secinit.exe File opened (read-only) \??\o: secinit.exe File opened (read-only) \??\V: secinit.exe File opened (read-only) \??\x: secinit.exe File opened (read-only) \??\v: secinit.exe File opened (read-only) \??\w: secinit.exe File opened (read-only) \??\Y: secinit.exe File opened (read-only) \??\e: secinit.exe File opened (read-only) \??\G: secinit.exe File opened (read-only) \??\j: secinit.exe File opened (read-only) \??\r: secinit.exe File opened (read-only) \??\T: secinit.exe File opened (read-only) \??\Z: secinit.exe File opened (read-only) \??\k: secinit.exe File opened (read-only) \??\l: secinit.exe File opened (read-only) \??\P: secinit.exe File opened (read-only) \??\Q: secinit.exe File opened (read-only) \??\s: secinit.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2020 set thread context of 2160 2020 80d5a0defa331caea1ebe788bf1dc116.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2160 secinit.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2160 2020 80d5a0defa331caea1ebe788bf1dc116.exe 28 PID 2020 wrote to memory of 2160 2020 80d5a0defa331caea1ebe788bf1dc116.exe 28 PID 2020 wrote to memory of 2160 2020 80d5a0defa331caea1ebe788bf1dc116.exe 28 PID 2020 wrote to memory of 2160 2020 80d5a0defa331caea1ebe788bf1dc116.exe 28 PID 2020 wrote to memory of 2160 2020 80d5a0defa331caea1ebe788bf1dc116.exe 28 PID 2020 wrote to memory of 2160 2020 80d5a0defa331caea1ebe788bf1dc116.exe 28 PID 2020 wrote to memory of 2160 2020 80d5a0defa331caea1ebe788bf1dc116.exe 28 PID 2020 wrote to memory of 2160 2020 80d5a0defa331caea1ebe788bf1dc116.exe 28 PID 2020 wrote to memory of 2160 2020 80d5a0defa331caea1ebe788bf1dc116.exe 28 PID 2020 wrote to memory of 2160 2020 80d5a0defa331caea1ebe788bf1dc116.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\80d5a0defa331caea1ebe788bf1dc116.exe"C:\Users\Admin\AppData\Local\Temp\80d5a0defa331caea1ebe788bf1dc116.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\secinit.exe"C:\Windows\System32\secinit.exe"2⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
PID:2160
-