Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
13-11-2020 15:39
Static task
static1
Behavioral task
behavioral1
Sample
d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.exe
Resource
win7v20201028
General
-
Target
d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.exe
-
Size
327KB
-
MD5
2e2ed2b2bc917a92eb0d9bdb466da3b9
-
SHA1
f361d57f199c8a75c8e92b5ff0385e978cda0e53
-
SHA256
d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702
-
SHA512
7011c2fea9a87c19b86ce4fff579a7e73796ea9fc4474880ef0f84801f86a37b385b54cb271dc486f38ff3fd6f1727d0ac640e7155f1fa297b80e61e360fa844
Malware Config
Extracted
ursnif
- dga_base_url
-
dga_crc
0
-
dga_season
0
- dga_tlds
- dns_servers
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
bcryider.exepid process 1980 bcryider.exe -
Deletes itself 1 IoCs
Processes:
bcryider.exepid process 1980 bcryider.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 1996 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\capiript = "C:\\Users\\Admin\\AppData\\Roaming\\Devidisc\\bcryider.exe" d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
bcryider.exesvchost.exedescription pid process target process PID 1980 set thread context of 604 1980 bcryider.exe svchost.exe PID 604 set thread context of 1276 604 svchost.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
bcryider.exeExplorer.EXEpid process 1980 bcryider.exe 1276 Explorer.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
bcryider.exesvchost.exepid process 1980 bcryider.exe 604 svchost.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.execmd.execmd.exebcryider.exesvchost.exeExplorer.EXEcmd.exedescription pid process target process PID 1848 wrote to memory of 1428 1848 d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.exe cmd.exe PID 1848 wrote to memory of 1428 1848 d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.exe cmd.exe PID 1848 wrote to memory of 1428 1848 d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.exe cmd.exe PID 1848 wrote to memory of 1428 1848 d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.exe cmd.exe PID 1428 wrote to memory of 1996 1428 cmd.exe cmd.exe PID 1428 wrote to memory of 1996 1428 cmd.exe cmd.exe PID 1428 wrote to memory of 1996 1428 cmd.exe cmd.exe PID 1428 wrote to memory of 1996 1428 cmd.exe cmd.exe PID 1996 wrote to memory of 1980 1996 cmd.exe bcryider.exe PID 1996 wrote to memory of 1980 1996 cmd.exe bcryider.exe PID 1996 wrote to memory of 1980 1996 cmd.exe bcryider.exe PID 1996 wrote to memory of 1980 1996 cmd.exe bcryider.exe PID 1980 wrote to memory of 604 1980 bcryider.exe svchost.exe PID 1980 wrote to memory of 604 1980 bcryider.exe svchost.exe PID 1980 wrote to memory of 604 1980 bcryider.exe svchost.exe PID 1980 wrote to memory of 604 1980 bcryider.exe svchost.exe PID 1980 wrote to memory of 604 1980 bcryider.exe svchost.exe PID 1980 wrote to memory of 604 1980 bcryider.exe svchost.exe PID 1980 wrote to memory of 604 1980 bcryider.exe svchost.exe PID 604 wrote to memory of 1276 604 svchost.exe Explorer.EXE PID 604 wrote to memory of 1276 604 svchost.exe Explorer.EXE PID 604 wrote to memory of 1276 604 svchost.exe Explorer.EXE PID 1276 wrote to memory of 660 1276 Explorer.EXE cmd.exe PID 1276 wrote to memory of 660 1276 Explorer.EXE cmd.exe PID 1276 wrote to memory of 660 1276 Explorer.EXE cmd.exe PID 660 wrote to memory of 1916 660 cmd.exe nslookup.exe PID 660 wrote to memory of 1916 660 cmd.exe nslookup.exe PID 660 wrote to memory of 1916 660 cmd.exe nslookup.exe PID 1276 wrote to memory of 1076 1276 Explorer.EXE cmd.exe PID 1276 wrote to memory of 1076 1276 Explorer.EXE cmd.exe PID 1276 wrote to memory of 1076 1276 Explorer.EXE cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.exe"C:\Users\Admin\AppData\Local\Temp\d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\2472\1239.bat" "C:\Users\Admin\AppData\Roaming\Devidisc\bcryider.exe" "C:\Users\Admin\AppData\Local\Temp\D0C6A4~1.EXE""3⤵
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\Devidisc\bcryider.exe" "C:\Users\Admin\AppData\Local\Temp\D0C6A4~1.EXE""4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Roaming\Devidisc\bcryider.exe"C:\Users\Admin\AppData\Roaming\Devidisc\bcryider.exe" "C:\Users\Admin\AppData\Local\Temp\D0C6A4~1.EXE"5⤵
- Executes dropped EXE
- Deletes itself
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:604
-
-
-
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\B52E.bi1"2⤵
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:1916
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\B52E.bi1"2⤵PID:1076
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
9b1bd114aff92414683f6e7197aadc34
SHA1321d20055bf5661156ae5a9f301a8209004eabfb
SHA256d9455f4a34a110acd243d8b806752049980c5629fe44a779d1b7529c587f76ba
SHA512cdfe277913ece2f3adac282e462bb4a327f615ffb94d1f56c411f5844ccfef8ee6c878068db899e27857f56fed3800c1bcd97035e5f14b87d73b67b8152d79fa
-
MD5
c4f77466fa6bb3b7b587745fd51eb73e
SHA1c9ee49b895e2cec4483b9e3d84e32f0d650edcbb
SHA25637d5f9a9a4db772e5bcc6a0211a3092049c09f438067bc36cde152e10b79eeb8
SHA51251c1ddeac48567d106cbcc5bad19b31639b73ec66d11ed83dbc90da880792df0b6bd6c6e28a712e854ceeb6bd96a3985e521cb9d666b0ccd087e96f4a90fc7d7
-
MD5
c4f77466fa6bb3b7b587745fd51eb73e
SHA1c9ee49b895e2cec4483b9e3d84e32f0d650edcbb
SHA25637d5f9a9a4db772e5bcc6a0211a3092049c09f438067bc36cde152e10b79eeb8
SHA51251c1ddeac48567d106cbcc5bad19b31639b73ec66d11ed83dbc90da880792df0b6bd6c6e28a712e854ceeb6bd96a3985e521cb9d666b0ccd087e96f4a90fc7d7
-
MD5
2e2ed2b2bc917a92eb0d9bdb466da3b9
SHA1f361d57f199c8a75c8e92b5ff0385e978cda0e53
SHA256d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702
SHA5127011c2fea9a87c19b86ce4fff579a7e73796ea9fc4474880ef0f84801f86a37b385b54cb271dc486f38ff3fd6f1727d0ac640e7155f1fa297b80e61e360fa844
-
MD5
2e2ed2b2bc917a92eb0d9bdb466da3b9
SHA1f361d57f199c8a75c8e92b5ff0385e978cda0e53
SHA256d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702
SHA5127011c2fea9a87c19b86ce4fff579a7e73796ea9fc4474880ef0f84801f86a37b385b54cb271dc486f38ff3fd6f1727d0ac640e7155f1fa297b80e61e360fa844
-
MD5
2e2ed2b2bc917a92eb0d9bdb466da3b9
SHA1f361d57f199c8a75c8e92b5ff0385e978cda0e53
SHA256d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702
SHA5127011c2fea9a87c19b86ce4fff579a7e73796ea9fc4474880ef0f84801f86a37b385b54cb271dc486f38ff3fd6f1727d0ac640e7155f1fa297b80e61e360fa844