Analysis
-
max time kernel
111s -
max time network
147s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-01-2022 21:27
Behavioral task
behavioral1
Sample
5739549850fe635fc0ac5de81ce1fd495669fcabc1b8ede35b82a22093c86399.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
5739549850fe635fc0ac5de81ce1fd495669fcabc1b8ede35b82a22093c86399.exe
Resource
win10-en-20211208
General
-
Target
5739549850fe635fc0ac5de81ce1fd495669fcabc1b8ede35b82a22093c86399.exe
-
Size
390KB
-
MD5
14f60998a77261a97c719b05e246716b
-
SHA1
3ed09498214d93c9ec14a15286546d242ad58943
-
SHA256
5739549850fe635fc0ac5de81ce1fd495669fcabc1b8ede35b82a22093c86399
-
SHA512
cbc039535a2ac2cb3398436098db7b008f03899cc765d397dc2a478a37742e3e542b15f8c1f27705a6d4b823eb72457bc2b5b5a1c763f592eb7b6724f0fba200
Malware Config
Signatures
-
Detected AnchorDNS Backdoor 1 IoCs
Sample triggered yara rules associated with the AnchorDNS malware family.
resource yara_rule behavioral2/files/0x000500000001ab13-115.dat family_anchor_dns -
Sets DLL path for service in the registry 2 TTPs
-
Tries to connect to .bazar domain 2 IoCs
Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.
flow ioc 6 foreducation.bazar 7 foreducation.bazar -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 checkip.amazonaws.com -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\netdvfsk.dll 5739549850fe635fc0ac5de81ce1fd495669fcabc1b8ede35b82a22093c86399.exe File opened for modification C:\Windows\netdvfsk.dll:$GUID svchost.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 680 timeout.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Windows\netdvfsk.dll:$GUID svchost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2620 wrote to memory of 3512 2620 5739549850fe635fc0ac5de81ce1fd495669fcabc1b8ede35b82a22093c86399.exe 69 PID 2620 wrote to memory of 3512 2620 5739549850fe635fc0ac5de81ce1fd495669fcabc1b8ede35b82a22093c86399.exe 69 PID 2620 wrote to memory of 3512 2620 5739549850fe635fc0ac5de81ce1fd495669fcabc1b8ede35b82a22093c86399.exe 69 PID 3512 wrote to memory of 680 3512 cmd.exe 71 PID 3512 wrote to memory of 680 3512 cmd.exe 71 PID 3512 wrote to memory of 680 3512 cmd.exe 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\5739549850fe635fc0ac5de81ce1fd495669fcabc1b8ede35b82a22093c86399.exe"C:\Users\Admin\AppData\Local\Temp\5739549850fe635fc0ac5de81ce1fd495669fcabc1b8ede35b82a22093c86399.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\cmd.execmd.exe cmd.exe /c timeout 1 && del C:\Users\Admin\AppData\Local\Temp\5739549850fe635fc0ac5de81ce1fd495669fcabc1b8ede35b82a22093c86399.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:680
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k NetworkService1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- NTFS ADS
PID:2856