Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16-03-2024 05:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
cd2eb880ecbad847cb6205a42708e5e4.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
cd2eb880ecbad847cb6205a42708e5e4.exe
-
Size
3.2MB
-
MD5
cd2eb880ecbad847cb6205a42708e5e4
-
SHA1
aadaba5e4d887136cbcb3df0a4dc0eb94f391585
-
SHA256
001405ded84e227092bafe165117888d423719d7d75554025ec410d1d6558925
-
SHA512
b0591d6e4181275001fdefb70e04bdeb1b241dc696a887f36375826904bc164714bfe5d0b86e39952f877309571b9a0212ca5e5f122c6393cb17a797b0c2f8b2
-
SSDEEP
49152:Ww/9l48pPUbkSv5TCcLhAKFEl3In1bnkpisogrpu4r+3qwsi:WcfUbZGcLMIn1Lkp3lrpuh8i
Malware Config
Extracted
Family
rustybuer
C2
https://vesupyny.com/
Signatures
-
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\z: secinit.exe File opened (read-only) \??\F: secinit.exe File opened (read-only) \??\G: secinit.exe File opened (read-only) \??\R: secinit.exe File opened (read-only) \??\V: secinit.exe File opened (read-only) \??\q: secinit.exe File opened (read-only) \??\u: secinit.exe File opened (read-only) \??\U: secinit.exe File opened (read-only) \??\x: secinit.exe File opened (read-only) \??\A: secinit.exe File opened (read-only) \??\k: secinit.exe File opened (read-only) \??\K: secinit.exe File opened (read-only) \??\l: secinit.exe File opened (read-only) \??\v: secinit.exe File opened (read-only) \??\B: secinit.exe File opened (read-only) \??\g: secinit.exe File opened (read-only) \??\J: secinit.exe File opened (read-only) \??\P: secinit.exe File opened (read-only) \??\X: secinit.exe File opened (read-only) \??\y: secinit.exe File opened (read-only) \??\Z: secinit.exe File opened (read-only) \??\e: secinit.exe File opened (read-only) \??\h: secinit.exe File opened (read-only) \??\H: secinit.exe File opened (read-only) \??\j: secinit.exe File opened (read-only) \??\a: secinit.exe File opened (read-only) \??\D: secinit.exe File opened (read-only) \??\L: secinit.exe File opened (read-only) \??\Y: secinit.exe File opened (read-only) \??\E: secinit.exe File opened (read-only) \??\p: secinit.exe File opened (read-only) \??\s: secinit.exe File opened (read-only) \??\t: secinit.exe File opened (read-only) \??\w: secinit.exe File opened (read-only) \??\b: secinit.exe File opened (read-only) \??\m: secinit.exe File opened (read-only) \??\N: secinit.exe File opened (read-only) \??\O: secinit.exe File opened (read-only) \??\W: secinit.exe File opened (read-only) \??\o: secinit.exe File opened (read-only) \??\Q: secinit.exe File opened (read-only) \??\r: secinit.exe File opened (read-only) \??\S: secinit.exe File opened (read-only) \??\i: secinit.exe File opened (read-only) \??\I: secinit.exe File opened (read-only) \??\M: secinit.exe File opened (read-only) \??\n: secinit.exe File opened (read-only) \??\T: secinit.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4532 set thread context of 1780 4532 cd2eb880ecbad847cb6205a42708e5e4.exe 100 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1780 secinit.exe 1780 secinit.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4532 wrote to memory of 1780 4532 cd2eb880ecbad847cb6205a42708e5e4.exe 100 PID 4532 wrote to memory of 1780 4532 cd2eb880ecbad847cb6205a42708e5e4.exe 100 PID 4532 wrote to memory of 1780 4532 cd2eb880ecbad847cb6205a42708e5e4.exe 100 PID 4532 wrote to memory of 1780 4532 cd2eb880ecbad847cb6205a42708e5e4.exe 100 PID 4532 wrote to memory of 1780 4532 cd2eb880ecbad847cb6205a42708e5e4.exe 100 PID 4532 wrote to memory of 1780 4532 cd2eb880ecbad847cb6205a42708e5e4.exe 100 PID 4532 wrote to memory of 1780 4532 cd2eb880ecbad847cb6205a42708e5e4.exe 100 PID 4532 wrote to memory of 1780 4532 cd2eb880ecbad847cb6205a42708e5e4.exe 100 PID 4532 wrote to memory of 1780 4532 cd2eb880ecbad847cb6205a42708e5e4.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd2eb880ecbad847cb6205a42708e5e4.exe"C:\Users\Admin\AppData\Local\Temp\cd2eb880ecbad847cb6205a42708e5e4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\SysWOW64\secinit.exe"C:\Windows\System32\secinit.exe"2⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
PID:1780
-