Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
10-11-2020 11:49
Static task
static1
Behavioral task
behavioral1
Sample
d0136345e5d9b60ead6b8eabdd9887f43f96a27bfc2c1812737da9858e32d6ba.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
d0136345e5d9b60ead6b8eabdd9887f43f96a27bfc2c1812737da9858e32d6ba.exe
-
Size
365KB
-
MD5
7012fcbeda3bebbceef18eba8e2a78db
-
SHA1
64bf265931d406c6c1632c5a6a16cbf335b1202e
-
SHA256
d0136345e5d9b60ead6b8eabdd9887f43f96a27bfc2c1812737da9858e32d6ba
-
SHA512
9761ab641cc625e804922522c6b89d95f1dee7325f634d39f6f8eb71cd45af8b75f24152759ee59977cf026fa696d85d77161cd3db246915b2240e31c1f69a6b
Malware Config
Extracted
Family
ursnif
Attributes
- dga_base_url
-
dga_crc
0
-
dga_season
0
- dga_tlds
- dns_servers
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1692 bcryider.exe -
Deletes itself 1 IoCs
pid Process 1692 bcryider.exe -
Loads dropped DLL 1 IoCs
pid Process 344 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\capiript = "C:\\Users\\Admin\\AppData\\Roaming\\Devidisc\\bcryider.exe" d0136345e5d9b60ead6b8eabdd9887f43f96a27bfc2c1812737da9858e32d6ba.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1692 set thread context of 1660 1692 bcryider.exe 33 PID 1660 set thread context of 1268 1660 svchost.exe 21 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1692 bcryider.exe 1268 Explorer.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1692 bcryider.exe 1660 svchost.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 1744 wrote to memory of 1796 1744 d0136345e5d9b60ead6b8eabdd9887f43f96a27bfc2c1812737da9858e32d6ba.exe 29 PID 1744 wrote to memory of 1796 1744 d0136345e5d9b60ead6b8eabdd9887f43f96a27bfc2c1812737da9858e32d6ba.exe 29 PID 1744 wrote to memory of 1796 1744 d0136345e5d9b60ead6b8eabdd9887f43f96a27bfc2c1812737da9858e32d6ba.exe 29 PID 1744 wrote to memory of 1796 1744 d0136345e5d9b60ead6b8eabdd9887f43f96a27bfc2c1812737da9858e32d6ba.exe 29 PID 1796 wrote to memory of 344 1796 cmd.exe 31 PID 1796 wrote to memory of 344 1796 cmd.exe 31 PID 1796 wrote to memory of 344 1796 cmd.exe 31 PID 1796 wrote to memory of 344 1796 cmd.exe 31 PID 344 wrote to memory of 1692 344 cmd.exe 32 PID 344 wrote to memory of 1692 344 cmd.exe 32 PID 344 wrote to memory of 1692 344 cmd.exe 32 PID 344 wrote to memory of 1692 344 cmd.exe 32 PID 1692 wrote to memory of 1660 1692 bcryider.exe 33 PID 1692 wrote to memory of 1660 1692 bcryider.exe 33 PID 1692 wrote to memory of 1660 1692 bcryider.exe 33 PID 1692 wrote to memory of 1660 1692 bcryider.exe 33 PID 1692 wrote to memory of 1660 1692 bcryider.exe 33 PID 1692 wrote to memory of 1660 1692 bcryider.exe 33 PID 1692 wrote to memory of 1660 1692 bcryider.exe 33 PID 1660 wrote to memory of 1268 1660 svchost.exe 21 PID 1660 wrote to memory of 1268 1660 svchost.exe 21 PID 1660 wrote to memory of 1268 1660 svchost.exe 21 PID 1268 wrote to memory of 1720 1268 Explorer.EXE 36 PID 1268 wrote to memory of 1720 1268 Explorer.EXE 36 PID 1268 wrote to memory of 1720 1268 Explorer.EXE 36 PID 1720 wrote to memory of 988 1720 cmd.exe 38 PID 1720 wrote to memory of 988 1720 cmd.exe 38 PID 1720 wrote to memory of 988 1720 cmd.exe 38 PID 1268 wrote to memory of 1708 1268 Explorer.EXE 39 PID 1268 wrote to memory of 1708 1268 Explorer.EXE 39 PID 1268 wrote to memory of 1708 1268 Explorer.EXE 39
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\d0136345e5d9b60ead6b8eabdd9887f43f96a27bfc2c1812737da9858e32d6ba.exe"C:\Users\Admin\AppData\Local\Temp\d0136345e5d9b60ead6b8eabdd9887f43f96a27bfc2c1812737da9858e32d6ba.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\1DDE\EEF.bat" "C:\Users\Admin\AppData\Roaming\Devidisc\bcryider.exe" "C:\Users\Admin\AppData\Local\Temp\D01363~1.EXE""3⤵
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\Devidisc\bcryider.exe" "C:\Users\Admin\AppData\Local\Temp\D01363~1.EXE""4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Users\Admin\AppData\Roaming\Devidisc\bcryider.exe"C:\Users\Admin\AppData\Roaming\Devidisc\bcryider.exe" "C:\Users\Admin\AppData\Local\Temp\D01363~1.EXE"5⤵
- Executes dropped EXE
- Deletes itself
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1660
-
-
-
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\B934.bi1"2⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:988
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\B934.bi1"2⤵PID:1708
-