Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
09-06-2022 02:42
Static task
static1
Behavioral task
behavioral1
Sample
113ac743212e56ac38d22182d7b38385.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
113ac743212e56ac38d22182d7b38385.exe
Resource
win10v2004-20220414-en
General
-
Target
113ac743212e56ac38d22182d7b38385.exe
-
Size
196KB
-
MD5
113ac743212e56ac38d22182d7b38385
-
SHA1
f1098d33d3fe81e370ea1d75096f51d3bebcd855
-
SHA256
dfde4df8173b90daa38575d60c96bfc157e045a04e16e46bf073a64fdfd1285e
-
SHA512
ea3f71ea5a135c96a8b768ad4c1f5405892c28ec148981608de2433fdaca3bd80b2c90af5a39c9e67603829fabd1c60b11023511cc56f1d2d0106c747788c320
Malware Config
Signatures
-
suricata: ET MALWARE Backdoor.Win32.Pushdo.s Checkin
suricata: ET MALWARE Backdoor.Win32.Pushdo.s Checkin
-
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
-
Processes:
resource yara_rule behavioral2/memory/1792-138-0x0000000004000000-0x0000000004218000-memory.dmp upx behavioral2/memory/2000-140-0x0000000004000000-0x0000000004215000-memory.dmp upx behavioral2/memory/2000-144-0x0000000004000000-0x0000000004215000-memory.dmp upx behavioral2/memory/2000-147-0x0000000004000000-0x0000000004215000-memory.dmp upx behavioral2/memory/5004-197-0x0000000004000000-0x000000000408E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
svchost.exesvchost.exesvchost.exesvchost.exe113ac743212e56ac38d22182d7b38385.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Regedit32 = "C:\\Windows\\system32\\regedit.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Regedit32 = "C:\\Windows\\system32\\regedit.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Regedit32 = "C:\\Windows\\system32\\regedit.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Regedit32 = "C:\\Windows\\system32\\regedit.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tibqanobatib = "C:\\Users\\Admin\\tibqanobatib.exe" 113ac743212e56ac38d22182d7b38385.exe -
Suspicious use of SetThreadContext 12 IoCs
Processes:
113ac743212e56ac38d22182d7b38385.exesvchost.exesvchost.exedescription pid process target process PID 4244 set thread context of 1792 4244 113ac743212e56ac38d22182d7b38385.exe svchost.exe PID 4244 set thread context of 2000 4244 113ac743212e56ac38d22182d7b38385.exe svchost.exe PID 1792 set thread context of 3560 1792 svchost.exe svchost.exe PID 4244 set thread context of 4100 4244 113ac743212e56ac38d22182d7b38385.exe svchost.exe PID 2000 set thread context of 4488 2000 svchost.exe svchost.exe PID 1792 set thread context of 1884 1792 svchost.exe svchost.exe PID 2000 set thread context of 5036 2000 svchost.exe svchost.exe PID 1792 set thread context of 4172 1792 svchost.exe svchost.exe PID 2000 set thread context of 3328 2000 svchost.exe svchost.exe PID 1792 set thread context of 4468 1792 svchost.exe svchost.exe PID 2000 set thread context of 4284 2000 svchost.exe svchost.exe PID 4244 set thread context of 5004 4244 113ac743212e56ac38d22182d7b38385.exe svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
113ac743212e56ac38d22182d7b38385.exepid process 4244 113ac743212e56ac38d22182d7b38385.exe 4244 113ac743212e56ac38d22182d7b38385.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
113ac743212e56ac38d22182d7b38385.exesvchost.exesvchost.exedescription pid process target process PID 4244 wrote to memory of 1792 4244 113ac743212e56ac38d22182d7b38385.exe svchost.exe PID 4244 wrote to memory of 1792 4244 113ac743212e56ac38d22182d7b38385.exe svchost.exe PID 4244 wrote to memory of 1792 4244 113ac743212e56ac38d22182d7b38385.exe svchost.exe PID 4244 wrote to memory of 1792 4244 113ac743212e56ac38d22182d7b38385.exe svchost.exe PID 4244 wrote to memory of 1792 4244 113ac743212e56ac38d22182d7b38385.exe svchost.exe PID 4244 wrote to memory of 2000 4244 113ac743212e56ac38d22182d7b38385.exe svchost.exe PID 4244 wrote to memory of 2000 4244 113ac743212e56ac38d22182d7b38385.exe svchost.exe PID 4244 wrote to memory of 2000 4244 113ac743212e56ac38d22182d7b38385.exe svchost.exe PID 4244 wrote to memory of 2000 4244 113ac743212e56ac38d22182d7b38385.exe svchost.exe PID 1792 wrote to memory of 3560 1792 svchost.exe svchost.exe PID 1792 wrote to memory of 3560 1792 svchost.exe svchost.exe PID 1792 wrote to memory of 3560 1792 svchost.exe svchost.exe PID 1792 wrote to memory of 3560 1792 svchost.exe svchost.exe PID 4244 wrote to memory of 2000 4244 113ac743212e56ac38d22182d7b38385.exe svchost.exe PID 1792 wrote to memory of 3560 1792 svchost.exe svchost.exe PID 4244 wrote to memory of 4100 4244 113ac743212e56ac38d22182d7b38385.exe svchost.exe PID 4244 wrote to memory of 4100 4244 113ac743212e56ac38d22182d7b38385.exe svchost.exe PID 4244 wrote to memory of 4100 4244 113ac743212e56ac38d22182d7b38385.exe svchost.exe PID 4244 wrote to memory of 4100 4244 113ac743212e56ac38d22182d7b38385.exe svchost.exe PID 4244 wrote to memory of 4100 4244 113ac743212e56ac38d22182d7b38385.exe svchost.exe PID 2000 wrote to memory of 4488 2000 svchost.exe svchost.exe PID 2000 wrote to memory of 4488 2000 svchost.exe svchost.exe PID 2000 wrote to memory of 4488 2000 svchost.exe svchost.exe PID 2000 wrote to memory of 4488 2000 svchost.exe svchost.exe PID 1792 wrote to memory of 3560 1792 svchost.exe svchost.exe PID 1792 wrote to memory of 1884 1792 svchost.exe svchost.exe PID 1792 wrote to memory of 1884 1792 svchost.exe svchost.exe PID 1792 wrote to memory of 1884 1792 svchost.exe svchost.exe PID 1792 wrote to memory of 1884 1792 svchost.exe svchost.exe PID 2000 wrote to memory of 4488 2000 svchost.exe svchost.exe PID 1792 wrote to memory of 1884 1792 svchost.exe svchost.exe PID 2000 wrote to memory of 4488 2000 svchost.exe svchost.exe PID 2000 wrote to memory of 5036 2000 svchost.exe svchost.exe PID 2000 wrote to memory of 5036 2000 svchost.exe svchost.exe PID 2000 wrote to memory of 5036 2000 svchost.exe svchost.exe PID 2000 wrote to memory of 5036 2000 svchost.exe svchost.exe PID 2000 wrote to memory of 5036 2000 svchost.exe svchost.exe PID 1792 wrote to memory of 1884 1792 svchost.exe svchost.exe PID 1792 wrote to memory of 4172 1792 svchost.exe svchost.exe PID 1792 wrote to memory of 4172 1792 svchost.exe svchost.exe PID 1792 wrote to memory of 4172 1792 svchost.exe svchost.exe PID 1792 wrote to memory of 4172 1792 svchost.exe svchost.exe PID 1792 wrote to memory of 4172 1792 svchost.exe svchost.exe PID 2000 wrote to memory of 5036 2000 svchost.exe svchost.exe PID 2000 wrote to memory of 3328 2000 svchost.exe svchost.exe PID 2000 wrote to memory of 3328 2000 svchost.exe svchost.exe PID 2000 wrote to memory of 3328 2000 svchost.exe svchost.exe PID 2000 wrote to memory of 3328 2000 svchost.exe svchost.exe PID 2000 wrote to memory of 3328 2000 svchost.exe svchost.exe PID 1792 wrote to memory of 4172 1792 svchost.exe svchost.exe PID 1792 wrote to memory of 4468 1792 svchost.exe svchost.exe PID 1792 wrote to memory of 4468 1792 svchost.exe svchost.exe PID 1792 wrote to memory of 4468 1792 svchost.exe svchost.exe PID 1792 wrote to memory of 4468 1792 svchost.exe svchost.exe PID 1792 wrote to memory of 4468 1792 svchost.exe svchost.exe PID 2000 wrote to memory of 3328 2000 svchost.exe svchost.exe PID 2000 wrote to memory of 4284 2000 svchost.exe svchost.exe PID 2000 wrote to memory of 4284 2000 svchost.exe svchost.exe PID 2000 wrote to memory of 4284 2000 svchost.exe svchost.exe PID 2000 wrote to memory of 4284 2000 svchost.exe svchost.exe PID 1792 wrote to memory of 4468 1792 svchost.exe svchost.exe PID 2000 wrote to memory of 4284 2000 svchost.exe svchost.exe PID 2000 wrote to memory of 4284 2000 svchost.exe svchost.exe PID 4244 wrote to memory of 5004 4244 113ac743212e56ac38d22182d7b38385.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\113ac743212e56ac38d22182d7b38385.exe"C:\Users\Admin\AppData\Local\Temp\113ac743212e56ac38d22182d7b38385.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:3560
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1884
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4172
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4468
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4100
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Adds Run key to start application
PID:3328 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Adds Run key to start application
PID:4284 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:5004
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe1⤵
- Adds Run key to start application
PID:4488
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe1⤵
- Adds Run key to start application
PID:5036