Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
13-11-2020 15:39
Static task
static1
Behavioral task
behavioral1
Sample
d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.exe
-
Size
327KB
-
MD5
2e2ed2b2bc917a92eb0d9bdb466da3b9
-
SHA1
f361d57f199c8a75c8e92b5ff0385e978cda0e53
-
SHA256
d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702
-
SHA512
7011c2fea9a87c19b86ce4fff579a7e73796ea9fc4474880ef0f84801f86a37b385b54cb271dc486f38ff3fd6f1727d0ac640e7155f1fa297b80e61e360fa844
Malware Config
Extracted
Family
ursnif
Attributes
- dga_base_url
-
dga_crc
0
-
dga_season
0
- dga_tlds
- dns_servers
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1980 bcryider.exe -
Deletes itself 1 IoCs
pid Process 1980 bcryider.exe -
Loads dropped DLL 1 IoCs
pid Process 1996 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\capiript = "C:\\Users\\Admin\\AppData\\Roaming\\Devidisc\\bcryider.exe" d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1980 set thread context of 604 1980 bcryider.exe 33 PID 604 set thread context of 1276 604 svchost.exe 21 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1980 bcryider.exe 1276 Explorer.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1980 bcryider.exe 604 svchost.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 1848 wrote to memory of 1428 1848 d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.exe 26 PID 1848 wrote to memory of 1428 1848 d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.exe 26 PID 1848 wrote to memory of 1428 1848 d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.exe 26 PID 1848 wrote to memory of 1428 1848 d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.exe 26 PID 1428 wrote to memory of 1996 1428 cmd.exe 28 PID 1428 wrote to memory of 1996 1428 cmd.exe 28 PID 1428 wrote to memory of 1996 1428 cmd.exe 28 PID 1428 wrote to memory of 1996 1428 cmd.exe 28 PID 1996 wrote to memory of 1980 1996 cmd.exe 29 PID 1996 wrote to memory of 1980 1996 cmd.exe 29 PID 1996 wrote to memory of 1980 1996 cmd.exe 29 PID 1996 wrote to memory of 1980 1996 cmd.exe 29 PID 1980 wrote to memory of 604 1980 bcryider.exe 33 PID 1980 wrote to memory of 604 1980 bcryider.exe 33 PID 1980 wrote to memory of 604 1980 bcryider.exe 33 PID 1980 wrote to memory of 604 1980 bcryider.exe 33 PID 1980 wrote to memory of 604 1980 bcryider.exe 33 PID 1980 wrote to memory of 604 1980 bcryider.exe 33 PID 1980 wrote to memory of 604 1980 bcryider.exe 33 PID 604 wrote to memory of 1276 604 svchost.exe 21 PID 604 wrote to memory of 1276 604 svchost.exe 21 PID 604 wrote to memory of 1276 604 svchost.exe 21 PID 1276 wrote to memory of 660 1276 Explorer.EXE 36 PID 1276 wrote to memory of 660 1276 Explorer.EXE 36 PID 1276 wrote to memory of 660 1276 Explorer.EXE 36 PID 660 wrote to memory of 1916 660 cmd.exe 38 PID 660 wrote to memory of 1916 660 cmd.exe 38 PID 660 wrote to memory of 1916 660 cmd.exe 38 PID 1276 wrote to memory of 1076 1276 Explorer.EXE 39 PID 1276 wrote to memory of 1076 1276 Explorer.EXE 39 PID 1276 wrote to memory of 1076 1276 Explorer.EXE 39
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.exe"C:\Users\Admin\AppData\Local\Temp\d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\2472\1239.bat" "C:\Users\Admin\AppData\Roaming\Devidisc\bcryider.exe" "C:\Users\Admin\AppData\Local\Temp\D0C6A4~1.EXE""3⤵
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\Devidisc\bcryider.exe" "C:\Users\Admin\AppData\Local\Temp\D0C6A4~1.EXE""4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Roaming\Devidisc\bcryider.exe"C:\Users\Admin\AppData\Roaming\Devidisc\bcryider.exe" "C:\Users\Admin\AppData\Local\Temp\D0C6A4~1.EXE"5⤵
- Executes dropped EXE
- Deletes itself
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:604
-
-
-
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\B52E.bi1"2⤵
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:1916
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\B52E.bi1"2⤵PID:1076
-