Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
28-01-2022 18:25
Behavioral task
behavioral1
Sample
f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe
-
Size
162KB
-
MD5
35229446728ec9bbeae1599c13e86d82
-
SHA1
c759203d19d86540b6c1efa6eec6aab9ed25470d
-
SHA256
f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3
-
SHA512
597b3a0e315752ac24bcd11ea2992bdc6c47c575f6385b209a56065da35a074340aceb56f01d29e7486e84bf3cb124d3f00adff399cebca3cbfa219ebb2b5feb
Malware Config
Signatures
-
Detected AnchorDNS Backdoor 2 IoCs
Sample triggered yara rules associated with the AnchorDNS malware family.
resource yara_rule behavioral1/files/0x0008000000012213-56.dat family_anchor_dns behavioral1/files/0x0008000000012213-57.dat family_anchor_dns -
Executes dropped EXE 1 IoCs
pid Process 560 sihlknnk.exe -
Deletes itself 1 IoCs
pid Process 772 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1908 f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\sihlknnk.exe:$FILE sihlknnk.exe File created C:\Windows\SysWOW64\sihlknnk.exe f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe File opened for modification C:\Windows\SysWOW64\sihlknnk.exe f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe File opened for modification C:\Windows\SysWOW64\sihlknnk.exe:$TASK sihlknnk.exe File opened for modification C:\Windows\SysWOW64\sihlknnk.exe:$GUID sihlknnk.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1484 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1292 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1292 powershell.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1908 wrote to memory of 560 1908 f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe 27 PID 1908 wrote to memory of 560 1908 f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe 27 PID 1908 wrote to memory of 560 1908 f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe 27 PID 1908 wrote to memory of 560 1908 f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe 27 PID 1908 wrote to memory of 772 1908 f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe 28 PID 1908 wrote to memory of 772 1908 f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe 28 PID 1908 wrote to memory of 772 1908 f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe 28 PID 1908 wrote to memory of 772 1908 f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe 28 PID 1908 wrote to memory of 696 1908 f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe 29 PID 1908 wrote to memory of 696 1908 f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe 29 PID 1908 wrote to memory of 696 1908 f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe 29 PID 1908 wrote to memory of 696 1908 f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe 29 PID 772 wrote to memory of 1484 772 cmd.exe 32 PID 772 wrote to memory of 1484 772 cmd.exe 32 PID 772 wrote to memory of 1484 772 cmd.exe 32 PID 772 wrote to memory of 1484 772 cmd.exe 32 PID 696 wrote to memory of 1292 696 cmd.exe 33 PID 696 wrote to memory of 1292 696 cmd.exe 33 PID 696 wrote to memory of 1292 696 cmd.exe 33 PID 696 wrote to memory of 1292 696 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe"C:\Users\Admin\AppData\Local\Temp\f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\sihlknnk.exeC:\Windows\SysWOW64\sihlknnk.exe -i2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:560
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c timeout 3 && del C:\Users\Admin\AppData\Local\Temp\f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:1484
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C PowerShell "Start-Sleep 3; Remove-Item C:\Users\Admin\AppData\Local\Temp\f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowerShell "Start-Sleep 3; Remove-Item C:\Users\Admin\AppData\Local\Temp\f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1292
-
-