Analysis
-
max time kernel
124s -
max time network
131s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-01-2022 18:54
Behavioral task
behavioral1
Sample
b02494ffc1dab60510e6caee3c54695e24408e5bfa6621adcd19301cfc18e329.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
b02494ffc1dab60510e6caee3c54695e24408e5bfa6621adcd19301cfc18e329.exe
-
Size
162KB
-
MD5
ae48b4d1d0da879512b495ec1f80cf67
-
SHA1
b388243bf5899c99091ac2df13339f141659bbd4
-
SHA256
b02494ffc1dab60510e6caee3c54695e24408e5bfa6621adcd19301cfc18e329
-
SHA512
463df35f9275cd96a65d6db32ab33d8664daa413e4d0ff8c2da670c804468c8b8181db3a140f5d156300701b0647e52c0d15042ff81cb72bbac8e32f4aa643d4
Malware Config
Signatures
-
Detected AnchorDNS Backdoor 2 IoCs
Sample triggered yara rules associated with the AnchorDNS malware family.
resource yara_rule behavioral2/files/0x000600000001ab08-115.dat family_anchor_dns behavioral2/files/0x000600000001ab08-116.dat family_anchor_dns -
Executes dropped EXE 1 IoCs
pid Process 3592 hotvetee.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\hotvetee.exe b02494ffc1dab60510e6caee3c54695e24408e5bfa6621adcd19301cfc18e329.exe File opened for modification C:\Windows\SysWOW64\hotvetee.exe b02494ffc1dab60510e6caee3c54695e24408e5bfa6621adcd19301cfc18e329.exe File opened for modification C:\Windows\SysWOW64\hotvetee.exe:$TASK hotvetee.exe File opened for modification C:\Windows\SysWOW64\hotvetee.exe:$GUID hotvetee.exe File opened for modification C:\Windows\SysWOW64\hotvetee.exe:$FILE hotvetee.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4036 timeout.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4028 powershell.exe 4028 powershell.exe 4028 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4028 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3440 wrote to memory of 3592 3440 b02494ffc1dab60510e6caee3c54695e24408e5bfa6621adcd19301cfc18e329.exe 69 PID 3440 wrote to memory of 3592 3440 b02494ffc1dab60510e6caee3c54695e24408e5bfa6621adcd19301cfc18e329.exe 69 PID 3440 wrote to memory of 3592 3440 b02494ffc1dab60510e6caee3c54695e24408e5bfa6621adcd19301cfc18e329.exe 69 PID 3440 wrote to memory of 4120 3440 b02494ffc1dab60510e6caee3c54695e24408e5bfa6621adcd19301cfc18e329.exe 71 PID 3440 wrote to memory of 4120 3440 b02494ffc1dab60510e6caee3c54695e24408e5bfa6621adcd19301cfc18e329.exe 71 PID 3440 wrote to memory of 4120 3440 b02494ffc1dab60510e6caee3c54695e24408e5bfa6621adcd19301cfc18e329.exe 71 PID 3440 wrote to memory of 4132 3440 b02494ffc1dab60510e6caee3c54695e24408e5bfa6621adcd19301cfc18e329.exe 70 PID 3440 wrote to memory of 4132 3440 b02494ffc1dab60510e6caee3c54695e24408e5bfa6621adcd19301cfc18e329.exe 70 PID 3440 wrote to memory of 4132 3440 b02494ffc1dab60510e6caee3c54695e24408e5bfa6621adcd19301cfc18e329.exe 70 PID 4132 wrote to memory of 4028 4132 cmd.exe 74 PID 4132 wrote to memory of 4028 4132 cmd.exe 74 PID 4132 wrote to memory of 4028 4132 cmd.exe 74 PID 4120 wrote to memory of 4036 4120 cmd.exe 75 PID 4120 wrote to memory of 4036 4120 cmd.exe 75 PID 4120 wrote to memory of 4036 4120 cmd.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\b02494ffc1dab60510e6caee3c54695e24408e5bfa6621adcd19301cfc18e329.exe"C:\Users\Admin\AppData\Local\Temp\b02494ffc1dab60510e6caee3c54695e24408e5bfa6621adcd19301cfc18e329.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Windows\SysWOW64\hotvetee.exeC:\Windows\SysWOW64\hotvetee.exe -i2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3592
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C PowerShell "Start-Sleep 3; Remove-Item C:\Users\Admin\AppData\Local\Temp\b02494ffc1dab60510e6caee3c54695e24408e5bfa6621adcd19301cfc18e329.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowerShell "Start-Sleep 3; Remove-Item C:\Users\Admin\AppData\Local\Temp\b02494ffc1dab60510e6caee3c54695e24408e5bfa6621adcd19301cfc18e329.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4028
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c timeout 3 && del C:\Users\Admin\AppData\Local\Temp\b02494ffc1dab60510e6caee3c54695e24408e5bfa6621adcd19301cfc18e329.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:4036
-
-