Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
28-01-2022 21:27
Behavioral task
behavioral1
Sample
5739549850fe635fc0ac5de81ce1fd495669fcabc1b8ede35b82a22093c86399.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
5739549850fe635fc0ac5de81ce1fd495669fcabc1b8ede35b82a22093c86399.exe
Resource
win10-en-20211208
General
-
Target
5739549850fe635fc0ac5de81ce1fd495669fcabc1b8ede35b82a22093c86399.exe
-
Size
390KB
-
MD5
14f60998a77261a97c719b05e246716b
-
SHA1
3ed09498214d93c9ec14a15286546d242ad58943
-
SHA256
5739549850fe635fc0ac5de81ce1fd495669fcabc1b8ede35b82a22093c86399
-
SHA512
cbc039535a2ac2cb3398436098db7b008f03899cc765d397dc2a478a37742e3e542b15f8c1f27705a6d4b823eb72457bc2b5b5a1c763f592eb7b6724f0fba200
Malware Config
Signatures
-
Detected AnchorDNS Backdoor 1 IoCs
Sample triggered yara rules associated with the AnchorDNS malware family.
resource yara_rule behavioral1/files/0x000800000001222f-54.dat family_anchor_dns -
Sets DLL path for service in the registry 2 TTPs
-
Tries to connect to .bazar domain 2 IoCs
Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.
flow ioc 2 foreducation.bazar 3 foreducation.bazar -
Deletes itself 1 IoCs
pid Process 320 cmd.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.amazonaws.com -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\netbogdg.dll 5739549850fe635fc0ac5de81ce1fd495669fcabc1b8ede35b82a22093c86399.exe File opened for modification C:\Windows\netbogdg.dll:$GUID svchost.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 548 timeout.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Windows\netbogdg.dll:$GUID svchost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1684 wrote to memory of 320 1684 5739549850fe635fc0ac5de81ce1fd495669fcabc1b8ede35b82a22093c86399.exe 28 PID 1684 wrote to memory of 320 1684 5739549850fe635fc0ac5de81ce1fd495669fcabc1b8ede35b82a22093c86399.exe 28 PID 1684 wrote to memory of 320 1684 5739549850fe635fc0ac5de81ce1fd495669fcabc1b8ede35b82a22093c86399.exe 28 PID 1684 wrote to memory of 320 1684 5739549850fe635fc0ac5de81ce1fd495669fcabc1b8ede35b82a22093c86399.exe 28 PID 320 wrote to memory of 548 320 cmd.exe 30 PID 320 wrote to memory of 548 320 cmd.exe 30 PID 320 wrote to memory of 548 320 cmd.exe 30 PID 320 wrote to memory of 548 320 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5739549850fe635fc0ac5de81ce1fd495669fcabc1b8ede35b82a22093c86399.exe"C:\Users\Admin\AppData\Local\Temp\5739549850fe635fc0ac5de81ce1fd495669fcabc1b8ede35b82a22093c86399.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\cmd.execmd.exe cmd.exe /c timeout 1 && del C:\Users\Admin\AppData\Local\Temp\5739549850fe635fc0ac5de81ce1fd495669fcabc1b8ede35b82a22093c86399.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:548
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k NetworkService1⤵
- Drops file in Windows directory
- NTFS ADS
PID:760