Analysis
-
max time kernel
164s -
max time network
167s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-01-2022 17:50
Behavioral task
behavioral1
Sample
6c7847d103de865f906c2e1b7372f2e11ceebec890a68ee6532cebeab852618d.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
6c7847d103de865f906c2e1b7372f2e11ceebec890a68ee6532cebeab852618d.exe
-
Size
162KB
-
MD5
dd1d2518d48b0c9b15dc426816f627b5
-
SHA1
e26d5ed1aa0c38a64f0f9c2f85fc144b320c0147
-
SHA256
6c7847d103de865f906c2e1b7372f2e11ceebec890a68ee6532cebeab852618d
-
SHA512
dea2c64e3b245d00afc1bfa0b8f2e8baa9559e11b1af81dc25eb8d9a6e17460be9357aa3ba0a3f2d2a618b550a45a9ec23a1fe3edf0a123dc0bb95901d1b4840
Malware Config
Signatures
-
Detected AnchorDNS Backdoor 2 IoCs
Sample triggered yara rules associated with the AnchorDNS malware family.
resource yara_rule behavioral2/files/0x000600000001ab30-118.dat family_anchor_dns behavioral2/files/0x000600000001ab30-119.dat family_anchor_dns -
Executes dropped EXE 1 IoCs
pid Process 1216 gzfmegws.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\gzfmegws.exe:$FILE gzfmegws.exe File created C:\Windows\SysWOW64\gzfmegws.exe 6c7847d103de865f906c2e1b7372f2e11ceebec890a68ee6532cebeab852618d.exe File opened for modification C:\Windows\SysWOW64\gzfmegws.exe 6c7847d103de865f906c2e1b7372f2e11ceebec890a68ee6532cebeab852618d.exe File opened for modification C:\Windows\SysWOW64\gzfmegws.exe:$TASK gzfmegws.exe File opened for modification C:\Windows\SysWOW64\gzfmegws.exe:$GUID gzfmegws.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3044 timeout.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1712 powershell.exe 1712 powershell.exe 1712 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1712 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3472 wrote to memory of 1216 3472 6c7847d103de865f906c2e1b7372f2e11ceebec890a68ee6532cebeab852618d.exe 71 PID 3472 wrote to memory of 1216 3472 6c7847d103de865f906c2e1b7372f2e11ceebec890a68ee6532cebeab852618d.exe 71 PID 3472 wrote to memory of 1216 3472 6c7847d103de865f906c2e1b7372f2e11ceebec890a68ee6532cebeab852618d.exe 71 PID 3472 wrote to memory of 780 3472 6c7847d103de865f906c2e1b7372f2e11ceebec890a68ee6532cebeab852618d.exe 72 PID 3472 wrote to memory of 780 3472 6c7847d103de865f906c2e1b7372f2e11ceebec890a68ee6532cebeab852618d.exe 72 PID 3472 wrote to memory of 780 3472 6c7847d103de865f906c2e1b7372f2e11ceebec890a68ee6532cebeab852618d.exe 72 PID 3472 wrote to memory of 1940 3472 6c7847d103de865f906c2e1b7372f2e11ceebec890a68ee6532cebeab852618d.exe 73 PID 3472 wrote to memory of 1940 3472 6c7847d103de865f906c2e1b7372f2e11ceebec890a68ee6532cebeab852618d.exe 73 PID 3472 wrote to memory of 1940 3472 6c7847d103de865f906c2e1b7372f2e11ceebec890a68ee6532cebeab852618d.exe 73 PID 780 wrote to memory of 3044 780 cmd.exe 76 PID 780 wrote to memory of 3044 780 cmd.exe 76 PID 780 wrote to memory of 3044 780 cmd.exe 76 PID 1940 wrote to memory of 1712 1940 cmd.exe 77 PID 1940 wrote to memory of 1712 1940 cmd.exe 77 PID 1940 wrote to memory of 1712 1940 cmd.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c7847d103de865f906c2e1b7372f2e11ceebec890a68ee6532cebeab852618d.exe"C:\Users\Admin\AppData\Local\Temp\6c7847d103de865f906c2e1b7372f2e11ceebec890a68ee6532cebeab852618d.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\SysWOW64\gzfmegws.exeC:\Windows\SysWOW64\gzfmegws.exe -i2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1216
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c timeout 3 && del C:\Users\Admin\AppData\Local\Temp\6c7847d103de865f906c2e1b7372f2e11ceebec890a68ee6532cebeab852618d.exe2⤵
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:3044
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C PowerShell "Start-Sleep 3; Remove-Item C:\Users\Admin\AppData\Local\Temp\6c7847d103de865f906c2e1b7372f2e11ceebec890a68ee6532cebeab852618d.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowerShell "Start-Sleep 3; Remove-Item C:\Users\Admin\AppData\Local\Temp\6c7847d103de865f906c2e1b7372f2e11ceebec890a68ee6532cebeab852618d.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
-