Analysis

  • max time kernel
    188s
  • max time network
    196s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    23-05-2022 23:58

General

  • Target

    be94526611d6f5597ff276d439a5bad8c6b414607066e68cf2abb24651c674bd.exe

  • Size

    828KB

  • MD5

    72700cb0d075d477bb06c4b939f9b3a6

  • SHA1

    856102b4864ec296f7ea50b607935da5f9a4e102

  • SHA256

    be94526611d6f5597ff276d439a5bad8c6b414607066e68cf2abb24651c674bd

  • SHA512

    b39a4ba2dfb6fba8306cd115872721c6a185cc763dd13791154b3109242853bc921162e3533f9ba5cfe0d41f54774c4d03d1b91509772ba02dcf059adcd7eea7

Malware Config

Signatures

  • suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

    suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be94526611d6f5597ff276d439a5bad8c6b414607066e68cf2abb24651c674bd.exe
    "C:\Users\Admin\AppData\Local\Temp\be94526611d6f5597ff276d439a5bad8c6b414607066e68cf2abb24651c674bd.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Users\Admin\AppData\Local\Temp\be94526611d6f5597ff276d439a5bad8c6b414607066e68cf2abb24651c674bd.exe
      C:\Users\Admin\AppData\Local\Temp\be94526611d6f5597ff276d439a5bad8c6b414607066e68cf2abb24651c674bd.exe
      2⤵
      • Adds Run key to start application
      PID:964

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/964-60-0x000000000045AEC0-mapping.dmp
  • memory/964-64-0x0000000000400000-0x000000000045D000-memory.dmp
    Filesize

    372KB

  • memory/964-65-0x0000000000400000-0x000000000045D000-memory.dmp
    Filesize

    372KB

  • memory/964-61-0x0000000000400000-0x000000000045D000-memory.dmp
    Filesize

    372KB

  • memory/964-55-0x0000000000400000-0x000000000045D000-memory.dmp
    Filesize

    372KB

  • memory/964-66-0x0000000000400000-0x000000000045D000-memory.dmp
    Filesize

    372KB

  • memory/2012-54-0x0000000075FB1000-0x0000000075FB3000-memory.dmp
    Filesize

    8KB

  • memory/2012-62-0x0000000000680000-0x0000000000690000-memory.dmp
    Filesize

    64KB