Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
28-01-2022 17:22
Behavioral task
behavioral1
Sample
2c446cad1e15d82521022281b81f905867e33e9ae33c3e7e4959972d40230775.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
2c446cad1e15d82521022281b81f905867e33e9ae33c3e7e4959972d40230775.exe
Resource
win10-en-20211208
General
-
Target
2c446cad1e15d82521022281b81f905867e33e9ae33c3e7e4959972d40230775.exe
-
Size
481KB
-
MD5
5d83bd79bc681fb123e9c4078437b48f
-
SHA1
fa98074dc18ad7e2d357b5d168c00a91256d87d1
-
SHA256
2c446cad1e15d82521022281b81f905867e33e9ae33c3e7e4959972d40230775
-
SHA512
933919fea47ff5102564f6597f1ed277e699cdd746835a0039fa531e50b8fbb18532626a6900b5c18e88d15d2f6173f41c3b2d8ccf9109802aaf27a502ab0dc6
Malware Config
Signatures
-
Detected AnchorDNS Backdoor 1 IoCs
Sample triggered yara rules associated with the AnchorDNS malware family.
resource yara_rule behavioral1/files/0x0006000000014023-55.dat family_anchor_dns -
Sets DLL path for service in the registry 2 TTPs
-
Tries to connect to .bazar domain 2 IoCs
Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.
flow ioc 2 toexample.bazar 3 toexample.bazar -
Deletes itself 1 IoCs
pid Process 576 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1528 Process not Found -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.amazonaws.com -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\System32\netehpkh.dll 2c446cad1e15d82521022281b81f905867e33e9ae33c3e7e4959972d40230775.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 588 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1412 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1412 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1732 wrote to memory of 576 1732 2c446cad1e15d82521022281b81f905867e33e9ae33c3e7e4959972d40230775.exe 28 PID 1732 wrote to memory of 576 1732 2c446cad1e15d82521022281b81f905867e33e9ae33c3e7e4959972d40230775.exe 28 PID 1732 wrote to memory of 576 1732 2c446cad1e15d82521022281b81f905867e33e9ae33c3e7e4959972d40230775.exe 28 PID 1732 wrote to memory of 268 1732 2c446cad1e15d82521022281b81f905867e33e9ae33c3e7e4959972d40230775.exe 29 PID 1732 wrote to memory of 268 1732 2c446cad1e15d82521022281b81f905867e33e9ae33c3e7e4959972d40230775.exe 29 PID 1732 wrote to memory of 268 1732 2c446cad1e15d82521022281b81f905867e33e9ae33c3e7e4959972d40230775.exe 29 PID 268 wrote to memory of 1412 268 cmd.exe 32 PID 268 wrote to memory of 1412 268 cmd.exe 32 PID 268 wrote to memory of 1412 268 cmd.exe 32 PID 576 wrote to memory of 588 576 cmd.exe 33 PID 576 wrote to memory of 588 576 cmd.exe 33 PID 576 wrote to memory of 588 576 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c446cad1e15d82521022281b81f905867e33e9ae33c3e7e4959972d40230775.exe"C:\Users\Admin\AppData\Local\Temp\2c446cad1e15d82521022281b81f905867e33e9ae33c3e7e4959972d40230775.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\system32\cmd.execmd.exe /c timeout 5 && del C:\Users\Admin\AppData\Local\Temp\2c446cad1e15d82521022281b81f905867e33e9ae33c3e7e4959972d40230775.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\system32\timeout.exetimeout 53⤵
- Delays execution with timeout.exe
PID:588
-
-
-
C:\Windows\system32\cmd.execmd.exe /C PowerShell "Start-Sleep 5; Remove-Item C:\Users\Admin\AppData\Local\Temp\2c446cad1e15d82521022281b81f905867e33e9ae33c3e7e4959972d40230775.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell "Start-Sleep 5; Remove-Item C:\Users\Admin\AppData\Local\Temp\2c446cad1e15d82521022281b81f905867e33e9ae33c3e7e4959972d40230775.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1412
-
-