Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
14-11-2020 18:32
Static task
static1
Behavioral task
behavioral1
Sample
522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.exe
-
Size
365KB
-
MD5
1ec1a06e9206527fa74c5560f1fa71b7
-
SHA1
808955643df13e421c270e377c819cde4dd2c845
-
SHA256
522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2
-
SHA512
f6d860a6b21db89615e90caadcc33734a0c6c1a0953fec6d9c0e9330dfb12d8455536ba7c398e86ed33d5e18490cc58ddae3b0c09733bbd1f58394cb5562c604
Malware Config
Extracted
Family
ursnif
Attributes
- dga_base_url
-
dga_crc
0
-
dga_season
0
- dga_tlds
- dns_servers
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1116 bcryider.exe -
Deletes itself 1 IoCs
pid Process 1116 bcryider.exe -
Loads dropped DLL 1 IoCs
pid Process 1640 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\capiript = "C:\\Users\\Admin\\AppData\\Roaming\\Devidisc\\bcryider.exe" 522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1116 set thread context of 1088 1116 bcryider.exe 33 PID 1088 set thread context of 1268 1088 svchost.exe 21 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1116 bcryider.exe 1268 Explorer.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1116 bcryider.exe 1088 svchost.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 2028 wrote to memory of 748 2028 522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.exe 29 PID 2028 wrote to memory of 748 2028 522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.exe 29 PID 2028 wrote to memory of 748 2028 522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.exe 29 PID 2028 wrote to memory of 748 2028 522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.exe 29 PID 748 wrote to memory of 1640 748 cmd.exe 31 PID 748 wrote to memory of 1640 748 cmd.exe 31 PID 748 wrote to memory of 1640 748 cmd.exe 31 PID 748 wrote to memory of 1640 748 cmd.exe 31 PID 1640 wrote to memory of 1116 1640 cmd.exe 32 PID 1640 wrote to memory of 1116 1640 cmd.exe 32 PID 1640 wrote to memory of 1116 1640 cmd.exe 32 PID 1640 wrote to memory of 1116 1640 cmd.exe 32 PID 1116 wrote to memory of 1088 1116 bcryider.exe 33 PID 1116 wrote to memory of 1088 1116 bcryider.exe 33 PID 1116 wrote to memory of 1088 1116 bcryider.exe 33 PID 1116 wrote to memory of 1088 1116 bcryider.exe 33 PID 1116 wrote to memory of 1088 1116 bcryider.exe 33 PID 1116 wrote to memory of 1088 1116 bcryider.exe 33 PID 1116 wrote to memory of 1088 1116 bcryider.exe 33 PID 1088 wrote to memory of 1268 1088 svchost.exe 21 PID 1088 wrote to memory of 1268 1088 svchost.exe 21 PID 1088 wrote to memory of 1268 1088 svchost.exe 21 PID 1268 wrote to memory of 696 1268 Explorer.EXE 36 PID 1268 wrote to memory of 696 1268 Explorer.EXE 36 PID 1268 wrote to memory of 696 1268 Explorer.EXE 36 PID 696 wrote to memory of 272 696 cmd.exe 38 PID 696 wrote to memory of 272 696 cmd.exe 38 PID 696 wrote to memory of 272 696 cmd.exe 38 PID 1268 wrote to memory of 1644 1268 Explorer.EXE 39 PID 1268 wrote to memory of 1644 1268 Explorer.EXE 39 PID 1268 wrote to memory of 1644 1268 Explorer.EXE 39
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.exe"C:\Users\Admin\AppData\Local\Temp\522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\4442\2221.bat" "C:\Users\Admin\AppData\Roaming\Devidisc\bcryider.exe" "C:\Users\Admin\AppData\Local\Temp\522B12~1.EXE""3⤵
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\Devidisc\bcryider.exe" "C:\Users\Admin\AppData\Local\Temp\522B12~1.EXE""4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Roaming\Devidisc\bcryider.exe"C:\Users\Admin\AppData\Roaming\Devidisc\bcryider.exe" "C:\Users\Admin\AppData\Local\Temp\522B12~1.EXE"5⤵
- Executes dropped EXE
- Deletes itself
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1088
-
-
-
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\CC08.bi1"2⤵
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:272
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\CC08.bi1"2⤵PID:1644
-