Analysis
-
max time kernel
188s -
max time network
196s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
23-05-2022 23:58
Static task
static1
Behavioral task
behavioral1
Sample
be94526611d6f5597ff276d439a5bad8c6b414607066e68cf2abb24651c674bd.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
be94526611d6f5597ff276d439a5bad8c6b414607066e68cf2abb24651c674bd.exe
Resource
win10v2004-20220414-en
General
-
Target
be94526611d6f5597ff276d439a5bad8c6b414607066e68cf2abb24651c674bd.exe
-
Size
828KB
-
MD5
72700cb0d075d477bb06c4b939f9b3a6
-
SHA1
856102b4864ec296f7ea50b607935da5f9a4e102
-
SHA256
be94526611d6f5597ff276d439a5bad8c6b414607066e68cf2abb24651c674bd
-
SHA512
b39a4ba2dfb6fba8306cd115872721c6a185cc763dd13791154b3109242853bc921162e3533f9ba5cfe0d41f54774c4d03d1b91509772ba02dcf059adcd7eea7
Malware Config
Signatures
-
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
-
Processes:
resource yara_rule behavioral1/memory/964-64-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/964-65-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/964-61-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/964-55-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/964-66-0x0000000000400000-0x000000000045D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
be94526611d6f5597ff276d439a5bad8c6b414607066e68cf2abb24651c674bd.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\4b7656a384744932c669fd2c0fe50764 = "regsvr32.exe /s /n /u /i:\"C:\\Users\\Admin\\AppData\\Roaming\\NV8QLELF0U.txt\" scrobj.dll." be94526611d6f5597ff276d439a5bad8c6b414607066e68cf2abb24651c674bd.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
be94526611d6f5597ff276d439a5bad8c6b414607066e68cf2abb24651c674bd.exedescription pid process target process PID 2012 set thread context of 964 2012 be94526611d6f5597ff276d439a5bad8c6b414607066e68cf2abb24651c674bd.exe be94526611d6f5597ff276d439a5bad8c6b414607066e68cf2abb24651c674bd.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
be94526611d6f5597ff276d439a5bad8c6b414607066e68cf2abb24651c674bd.exepid process 2012 be94526611d6f5597ff276d439a5bad8c6b414607066e68cf2abb24651c674bd.exe 2012 be94526611d6f5597ff276d439a5bad8c6b414607066e68cf2abb24651c674bd.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
be94526611d6f5597ff276d439a5bad8c6b414607066e68cf2abb24651c674bd.exedescription pid process target process PID 2012 wrote to memory of 964 2012 be94526611d6f5597ff276d439a5bad8c6b414607066e68cf2abb24651c674bd.exe be94526611d6f5597ff276d439a5bad8c6b414607066e68cf2abb24651c674bd.exe PID 2012 wrote to memory of 964 2012 be94526611d6f5597ff276d439a5bad8c6b414607066e68cf2abb24651c674bd.exe be94526611d6f5597ff276d439a5bad8c6b414607066e68cf2abb24651c674bd.exe PID 2012 wrote to memory of 964 2012 be94526611d6f5597ff276d439a5bad8c6b414607066e68cf2abb24651c674bd.exe be94526611d6f5597ff276d439a5bad8c6b414607066e68cf2abb24651c674bd.exe PID 2012 wrote to memory of 964 2012 be94526611d6f5597ff276d439a5bad8c6b414607066e68cf2abb24651c674bd.exe be94526611d6f5597ff276d439a5bad8c6b414607066e68cf2abb24651c674bd.exe PID 2012 wrote to memory of 964 2012 be94526611d6f5597ff276d439a5bad8c6b414607066e68cf2abb24651c674bd.exe be94526611d6f5597ff276d439a5bad8c6b414607066e68cf2abb24651c674bd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\be94526611d6f5597ff276d439a5bad8c6b414607066e68cf2abb24651c674bd.exe"C:\Users\Admin\AppData\Local\Temp\be94526611d6f5597ff276d439a5bad8c6b414607066e68cf2abb24651c674bd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\be94526611d6f5597ff276d439a5bad8c6b414607066e68cf2abb24651c674bd.exeC:\Users\Admin\AppData\Local\Temp\be94526611d6f5597ff276d439a5bad8c6b414607066e68cf2abb24651c674bd.exe2⤵
- Adds Run key to start application
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/964-60-0x000000000045AEC0-mapping.dmp
-
memory/964-64-0x0000000000400000-0x000000000045D000-memory.dmpFilesize
372KB
-
memory/964-65-0x0000000000400000-0x000000000045D000-memory.dmpFilesize
372KB
-
memory/964-61-0x0000000000400000-0x000000000045D000-memory.dmpFilesize
372KB
-
memory/964-55-0x0000000000400000-0x000000000045D000-memory.dmpFilesize
372KB
-
memory/964-66-0x0000000000400000-0x000000000045D000-memory.dmpFilesize
372KB
-
memory/2012-54-0x0000000075FB1000-0x0000000075FB3000-memory.dmpFilesize
8KB
-
memory/2012-62-0x0000000000680000-0x0000000000690000-memory.dmpFilesize
64KB