Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
10-11-2020 11:49
Static task
static1
Behavioral task
behavioral1
Sample
d0136345e5d9b60ead6b8eabdd9887f43f96a27bfc2c1812737da9858e32d6ba.exe
Resource
win7v20201028
General
-
Target
d0136345e5d9b60ead6b8eabdd9887f43f96a27bfc2c1812737da9858e32d6ba.exe
-
Size
365KB
-
MD5
7012fcbeda3bebbceef18eba8e2a78db
-
SHA1
64bf265931d406c6c1632c5a6a16cbf335b1202e
-
SHA256
d0136345e5d9b60ead6b8eabdd9887f43f96a27bfc2c1812737da9858e32d6ba
-
SHA512
9761ab641cc625e804922522c6b89d95f1dee7325f634d39f6f8eb71cd45af8b75f24152759ee59977cf026fa696d85d77161cd3db246915b2240e31c1f69a6b
Malware Config
Extracted
ursnif
- dga_base_url
-
dga_crc
0
-
dga_season
0
- dga_tlds
- dns_servers
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
bcryider.exepid process 1692 bcryider.exe -
Deletes itself 1 IoCs
Processes:
bcryider.exepid process 1692 bcryider.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 344 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
d0136345e5d9b60ead6b8eabdd9887f43f96a27bfc2c1812737da9858e32d6ba.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\capiript = "C:\\Users\\Admin\\AppData\\Roaming\\Devidisc\\bcryider.exe" d0136345e5d9b60ead6b8eabdd9887f43f96a27bfc2c1812737da9858e32d6ba.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
bcryider.exesvchost.exedescription pid process target process PID 1692 set thread context of 1660 1692 bcryider.exe svchost.exe PID 1660 set thread context of 1268 1660 svchost.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
bcryider.exeExplorer.EXEpid process 1692 bcryider.exe 1268 Explorer.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
bcryider.exesvchost.exepid process 1692 bcryider.exe 1660 svchost.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
d0136345e5d9b60ead6b8eabdd9887f43f96a27bfc2c1812737da9858e32d6ba.execmd.execmd.exebcryider.exesvchost.exeExplorer.EXEcmd.exedescription pid process target process PID 1744 wrote to memory of 1796 1744 d0136345e5d9b60ead6b8eabdd9887f43f96a27bfc2c1812737da9858e32d6ba.exe cmd.exe PID 1744 wrote to memory of 1796 1744 d0136345e5d9b60ead6b8eabdd9887f43f96a27bfc2c1812737da9858e32d6ba.exe cmd.exe PID 1744 wrote to memory of 1796 1744 d0136345e5d9b60ead6b8eabdd9887f43f96a27bfc2c1812737da9858e32d6ba.exe cmd.exe PID 1744 wrote to memory of 1796 1744 d0136345e5d9b60ead6b8eabdd9887f43f96a27bfc2c1812737da9858e32d6ba.exe cmd.exe PID 1796 wrote to memory of 344 1796 cmd.exe cmd.exe PID 1796 wrote to memory of 344 1796 cmd.exe cmd.exe PID 1796 wrote to memory of 344 1796 cmd.exe cmd.exe PID 1796 wrote to memory of 344 1796 cmd.exe cmd.exe PID 344 wrote to memory of 1692 344 cmd.exe bcryider.exe PID 344 wrote to memory of 1692 344 cmd.exe bcryider.exe PID 344 wrote to memory of 1692 344 cmd.exe bcryider.exe PID 344 wrote to memory of 1692 344 cmd.exe bcryider.exe PID 1692 wrote to memory of 1660 1692 bcryider.exe svchost.exe PID 1692 wrote to memory of 1660 1692 bcryider.exe svchost.exe PID 1692 wrote to memory of 1660 1692 bcryider.exe svchost.exe PID 1692 wrote to memory of 1660 1692 bcryider.exe svchost.exe PID 1692 wrote to memory of 1660 1692 bcryider.exe svchost.exe PID 1692 wrote to memory of 1660 1692 bcryider.exe svchost.exe PID 1692 wrote to memory of 1660 1692 bcryider.exe svchost.exe PID 1660 wrote to memory of 1268 1660 svchost.exe Explorer.EXE PID 1660 wrote to memory of 1268 1660 svchost.exe Explorer.EXE PID 1660 wrote to memory of 1268 1660 svchost.exe Explorer.EXE PID 1268 wrote to memory of 1720 1268 Explorer.EXE cmd.exe PID 1268 wrote to memory of 1720 1268 Explorer.EXE cmd.exe PID 1268 wrote to memory of 1720 1268 Explorer.EXE cmd.exe PID 1720 wrote to memory of 988 1720 cmd.exe nslookup.exe PID 1720 wrote to memory of 988 1720 cmd.exe nslookup.exe PID 1720 wrote to memory of 988 1720 cmd.exe nslookup.exe PID 1268 wrote to memory of 1708 1268 Explorer.EXE cmd.exe PID 1268 wrote to memory of 1708 1268 Explorer.EXE cmd.exe PID 1268 wrote to memory of 1708 1268 Explorer.EXE cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\d0136345e5d9b60ead6b8eabdd9887f43f96a27bfc2c1812737da9858e32d6ba.exe"C:\Users\Admin\AppData\Local\Temp\d0136345e5d9b60ead6b8eabdd9887f43f96a27bfc2c1812737da9858e32d6ba.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\1DDE\EEF.bat" "C:\Users\Admin\AppData\Roaming\Devidisc\bcryider.exe" "C:\Users\Admin\AppData\Local\Temp\D01363~1.EXE""3⤵
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\Devidisc\bcryider.exe" "C:\Users\Admin\AppData\Local\Temp\D01363~1.EXE""4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Users\Admin\AppData\Roaming\Devidisc\bcryider.exe"C:\Users\Admin\AppData\Roaming\Devidisc\bcryider.exe" "C:\Users\Admin\AppData\Local\Temp\D01363~1.EXE"5⤵
- Executes dropped EXE
- Deletes itself
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1660
-
-
-
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\B934.bi1"2⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:988
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\B934.bi1"2⤵PID:1708
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
6b755eae8af19c5c6c577380117cc321
SHA1c274fed0510070d970896aad9ea70ae50deea61f
SHA256c5949aa1c4ae0448e60bdb48f18008a196ed445af9f6a57cd6889a4b0a01d9de
SHA512c8c9d5497d8b452b55182e80b12f236ab5dd4f12276d8f9af9eccb1bc46eae8fac8e1239c11c68b814f44aefd712d83bc1f95b2d7b1d51b7853236bf3942b0c2
-
MD5
c4f77466fa6bb3b7b587745fd51eb73e
SHA1c9ee49b895e2cec4483b9e3d84e32f0d650edcbb
SHA25637d5f9a9a4db772e5bcc6a0211a3092049c09f438067bc36cde152e10b79eeb8
SHA51251c1ddeac48567d106cbcc5bad19b31639b73ec66d11ed83dbc90da880792df0b6bd6c6e28a712e854ceeb6bd96a3985e521cb9d666b0ccd087e96f4a90fc7d7
-
MD5
c4f77466fa6bb3b7b587745fd51eb73e
SHA1c9ee49b895e2cec4483b9e3d84e32f0d650edcbb
SHA25637d5f9a9a4db772e5bcc6a0211a3092049c09f438067bc36cde152e10b79eeb8
SHA51251c1ddeac48567d106cbcc5bad19b31639b73ec66d11ed83dbc90da880792df0b6bd6c6e28a712e854ceeb6bd96a3985e521cb9d666b0ccd087e96f4a90fc7d7
-
MD5
7012fcbeda3bebbceef18eba8e2a78db
SHA164bf265931d406c6c1632c5a6a16cbf335b1202e
SHA256d0136345e5d9b60ead6b8eabdd9887f43f96a27bfc2c1812737da9858e32d6ba
SHA5129761ab641cc625e804922522c6b89d95f1dee7325f634d39f6f8eb71cd45af8b75f24152759ee59977cf026fa696d85d77161cd3db246915b2240e31c1f69a6b
-
MD5
7012fcbeda3bebbceef18eba8e2a78db
SHA164bf265931d406c6c1632c5a6a16cbf335b1202e
SHA256d0136345e5d9b60ead6b8eabdd9887f43f96a27bfc2c1812737da9858e32d6ba
SHA5129761ab641cc625e804922522c6b89d95f1dee7325f634d39f6f8eb71cd45af8b75f24152759ee59977cf026fa696d85d77161cd3db246915b2240e31c1f69a6b
-
MD5
7012fcbeda3bebbceef18eba8e2a78db
SHA164bf265931d406c6c1632c5a6a16cbf335b1202e
SHA256d0136345e5d9b60ead6b8eabdd9887f43f96a27bfc2c1812737da9858e32d6ba
SHA5129761ab641cc625e804922522c6b89d95f1dee7325f634d39f6f8eb71cd45af8b75f24152759ee59977cf026fa696d85d77161cd3db246915b2240e31c1f69a6b