Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
14-11-2020 18:32
Static task
static1
Behavioral task
behavioral1
Sample
522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.exe
Resource
win7v20201028
General
-
Target
522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.exe
-
Size
365KB
-
MD5
1ec1a06e9206527fa74c5560f1fa71b7
-
SHA1
808955643df13e421c270e377c819cde4dd2c845
-
SHA256
522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2
-
SHA512
f6d860a6b21db89615e90caadcc33734a0c6c1a0953fec6d9c0e9330dfb12d8455536ba7c398e86ed33d5e18490cc58ddae3b0c09733bbd1f58394cb5562c604
Malware Config
Extracted
ursnif
- dga_base_url
-
dga_crc
0
-
dga_season
0
- dga_tlds
- dns_servers
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
bcryider.exepid process 1116 bcryider.exe -
Deletes itself 1 IoCs
Processes:
bcryider.exepid process 1116 bcryider.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 1640 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\capiript = "C:\\Users\\Admin\\AppData\\Roaming\\Devidisc\\bcryider.exe" 522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
bcryider.exesvchost.exedescription pid process target process PID 1116 set thread context of 1088 1116 bcryider.exe svchost.exe PID 1088 set thread context of 1268 1088 svchost.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
bcryider.exeExplorer.EXEpid process 1116 bcryider.exe 1268 Explorer.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
bcryider.exesvchost.exepid process 1116 bcryider.exe 1088 svchost.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.execmd.execmd.exebcryider.exesvchost.exeExplorer.EXEcmd.exedescription pid process target process PID 2028 wrote to memory of 748 2028 522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.exe cmd.exe PID 2028 wrote to memory of 748 2028 522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.exe cmd.exe PID 2028 wrote to memory of 748 2028 522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.exe cmd.exe PID 2028 wrote to memory of 748 2028 522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.exe cmd.exe PID 748 wrote to memory of 1640 748 cmd.exe cmd.exe PID 748 wrote to memory of 1640 748 cmd.exe cmd.exe PID 748 wrote to memory of 1640 748 cmd.exe cmd.exe PID 748 wrote to memory of 1640 748 cmd.exe cmd.exe PID 1640 wrote to memory of 1116 1640 cmd.exe bcryider.exe PID 1640 wrote to memory of 1116 1640 cmd.exe bcryider.exe PID 1640 wrote to memory of 1116 1640 cmd.exe bcryider.exe PID 1640 wrote to memory of 1116 1640 cmd.exe bcryider.exe PID 1116 wrote to memory of 1088 1116 bcryider.exe svchost.exe PID 1116 wrote to memory of 1088 1116 bcryider.exe svchost.exe PID 1116 wrote to memory of 1088 1116 bcryider.exe svchost.exe PID 1116 wrote to memory of 1088 1116 bcryider.exe svchost.exe PID 1116 wrote to memory of 1088 1116 bcryider.exe svchost.exe PID 1116 wrote to memory of 1088 1116 bcryider.exe svchost.exe PID 1116 wrote to memory of 1088 1116 bcryider.exe svchost.exe PID 1088 wrote to memory of 1268 1088 svchost.exe Explorer.EXE PID 1088 wrote to memory of 1268 1088 svchost.exe Explorer.EXE PID 1088 wrote to memory of 1268 1088 svchost.exe Explorer.EXE PID 1268 wrote to memory of 696 1268 Explorer.EXE cmd.exe PID 1268 wrote to memory of 696 1268 Explorer.EXE cmd.exe PID 1268 wrote to memory of 696 1268 Explorer.EXE cmd.exe PID 696 wrote to memory of 272 696 cmd.exe nslookup.exe PID 696 wrote to memory of 272 696 cmd.exe nslookup.exe PID 696 wrote to memory of 272 696 cmd.exe nslookup.exe PID 1268 wrote to memory of 1644 1268 Explorer.EXE cmd.exe PID 1268 wrote to memory of 1644 1268 Explorer.EXE cmd.exe PID 1268 wrote to memory of 1644 1268 Explorer.EXE cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.exe"C:\Users\Admin\AppData\Local\Temp\522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\4442\2221.bat" "C:\Users\Admin\AppData\Roaming\Devidisc\bcryider.exe" "C:\Users\Admin\AppData\Local\Temp\522B12~1.EXE""3⤵
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\Devidisc\bcryider.exe" "C:\Users\Admin\AppData\Local\Temp\522B12~1.EXE""4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Roaming\Devidisc\bcryider.exe"C:\Users\Admin\AppData\Roaming\Devidisc\bcryider.exe" "C:\Users\Admin\AppData\Local\Temp\522B12~1.EXE"5⤵
- Executes dropped EXE
- Deletes itself
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1088
-
-
-
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\CC08.bi1"2⤵
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:272
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\CC08.bi1"2⤵PID:1644
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d257030180eb5ae26444ef279d2ce3f7
SHA1886ef8cc6ded79fc1918a6c32f0280a6c44c215b
SHA256e74cfd27c28bda2695c0fd912a8a76a6773cd57d4878c23e8b4b88a87d0a1d21
SHA5123a159c25584e2b15db17c895514f93032cb99460eb8e1910884c2485b45e465fffc42126a0f1024d286ccd1d6f894aab852de4d7bebfc2f4950f90bcdbee1f1e
-
MD5
c4f77466fa6bb3b7b587745fd51eb73e
SHA1c9ee49b895e2cec4483b9e3d84e32f0d650edcbb
SHA25637d5f9a9a4db772e5bcc6a0211a3092049c09f438067bc36cde152e10b79eeb8
SHA51251c1ddeac48567d106cbcc5bad19b31639b73ec66d11ed83dbc90da880792df0b6bd6c6e28a712e854ceeb6bd96a3985e521cb9d666b0ccd087e96f4a90fc7d7
-
MD5
c4f77466fa6bb3b7b587745fd51eb73e
SHA1c9ee49b895e2cec4483b9e3d84e32f0d650edcbb
SHA25637d5f9a9a4db772e5bcc6a0211a3092049c09f438067bc36cde152e10b79eeb8
SHA51251c1ddeac48567d106cbcc5bad19b31639b73ec66d11ed83dbc90da880792df0b6bd6c6e28a712e854ceeb6bd96a3985e521cb9d666b0ccd087e96f4a90fc7d7
-
MD5
1ec1a06e9206527fa74c5560f1fa71b7
SHA1808955643df13e421c270e377c819cde4dd2c845
SHA256522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2
SHA512f6d860a6b21db89615e90caadcc33734a0c6c1a0953fec6d9c0e9330dfb12d8455536ba7c398e86ed33d5e18490cc58ddae3b0c09733bbd1f58394cb5562c604
-
MD5
1ec1a06e9206527fa74c5560f1fa71b7
SHA1808955643df13e421c270e377c819cde4dd2c845
SHA256522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2
SHA512f6d860a6b21db89615e90caadcc33734a0c6c1a0953fec6d9c0e9330dfb12d8455536ba7c398e86ed33d5e18490cc58ddae3b0c09733bbd1f58394cb5562c604
-
MD5
1ec1a06e9206527fa74c5560f1fa71b7
SHA1808955643df13e421c270e377c819cde4dd2c845
SHA256522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2
SHA512f6d860a6b21db89615e90caadcc33734a0c6c1a0953fec6d9c0e9330dfb12d8455536ba7c398e86ed33d5e18490cc58ddae3b0c09733bbd1f58394cb5562c604