Analysis
-
max time kernel
122s -
max time network
150s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-01-2022 18:25
Behavioral task
behavioral1
Sample
f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe
-
Size
162KB
-
MD5
35229446728ec9bbeae1599c13e86d82
-
SHA1
c759203d19d86540b6c1efa6eec6aab9ed25470d
-
SHA256
f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3
-
SHA512
597b3a0e315752ac24bcd11ea2992bdc6c47c575f6385b209a56065da35a074340aceb56f01d29e7486e84bf3cb124d3f00adff399cebca3cbfa219ebb2b5feb
Malware Config
Signatures
-
Detected AnchorDNS Backdoor 2 IoCs
Sample triggered yara rules associated with the AnchorDNS malware family.
resource yara_rule behavioral2/files/0x000600000001ab36-118.dat family_anchor_dns behavioral2/files/0x000600000001ab36-119.dat family_anchor_dns -
Executes dropped EXE 1 IoCs
pid Process 1448 jixqfimx.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\jixqfimx.exe f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe File opened for modification C:\Windows\SysWOW64\jixqfimx.exe f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe File opened for modification C:\Windows\SysWOW64\jixqfimx.exe:$TASK jixqfimx.exe File opened for modification C:\Windows\SysWOW64\jixqfimx.exe:$GUID jixqfimx.exe File opened for modification C:\Windows\SysWOW64\jixqfimx.exe:$FILE jixqfimx.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 892 timeout.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 796 powershell.exe 796 powershell.exe 796 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 796 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3064 wrote to memory of 1448 3064 f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe 68 PID 3064 wrote to memory of 1448 3064 f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe 68 PID 3064 wrote to memory of 1448 3064 f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe 68 PID 3064 wrote to memory of 1464 3064 f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe 70 PID 3064 wrote to memory of 1464 3064 f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe 70 PID 3064 wrote to memory of 1464 3064 f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe 70 PID 3064 wrote to memory of 972 3064 f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe 69 PID 3064 wrote to memory of 972 3064 f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe 69 PID 3064 wrote to memory of 972 3064 f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe 69 PID 972 wrote to memory of 796 972 cmd.exe 73 PID 972 wrote to memory of 796 972 cmd.exe 73 PID 972 wrote to memory of 796 972 cmd.exe 73 PID 1464 wrote to memory of 892 1464 cmd.exe 74 PID 1464 wrote to memory of 892 1464 cmd.exe 74 PID 1464 wrote to memory of 892 1464 cmd.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe"C:\Users\Admin\AppData\Local\Temp\f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\jixqfimx.exeC:\Windows\SysWOW64\jixqfimx.exe -i2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1448
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C PowerShell "Start-Sleep 3; Remove-Item C:\Users\Admin\AppData\Local\Temp\f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowerShell "Start-Sleep 3; Remove-Item C:\Users\Admin\AppData\Local\Temp\f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:796
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c timeout 3 && del C:\Users\Admin\AppData\Local\Temp\f7278cd22070f0418ac75b599b8bcc524ee9d6adbda4103d149c9484cdaeb4f3.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:892
-
-