Analysis
-
max time kernel
99s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
11-06-2022 04:10
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220414-en
General
-
Target
tmp.exe
-
Size
196KB
-
MD5
113ac743212e56ac38d22182d7b38385
-
SHA1
f1098d33d3fe81e370ea1d75096f51d3bebcd855
-
SHA256
dfde4df8173b90daa38575d60c96bfc157e045a04e16e46bf073a64fdfd1285e
-
SHA512
ea3f71ea5a135c96a8b768ad4c1f5405892c28ec148981608de2433fdaca3bd80b2c90af5a39c9e67603829fabd1c60b11023511cc56f1d2d0106c747788c320
Malware Config
Signatures
-
suricata: ET MALWARE Backdoor.Win32.Pushdo.s Checkin
suricata: ET MALWARE Backdoor.Win32.Pushdo.s Checkin
-
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
-
Processes:
resource yara_rule behavioral1/memory/636-62-0x0000000004000000-0x0000000004218000-memory.dmp upx behavioral1/memory/628-68-0x0000000004000000-0x000000000408E000-memory.dmp upx behavioral1/memory/1192-72-0x0000000004000000-0x0000000004215000-memory.dmp upx behavioral1/memory/1192-77-0x0000000004000000-0x0000000004215000-memory.dmp upx behavioral1/memory/1192-75-0x0000000004000000-0x0000000004215000-memory.dmp upx -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
svchost.exesvchost.exetmp.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Regedit32 = "C:\\Windows\\system32\\regedit.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Regedit32 = "C:\\Windows\\system32\\regedit.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\tibqanobatib = "C:\\Users\\Admin\\tibqanobatib.exe" tmp.exe -
Suspicious use of SetThreadContext 9 IoCs
Processes:
tmp.exesvchost.exesvchost.exedescription pid process target process PID 1824 set thread context of 636 1824 tmp.exe svchost.exe PID 1824 set thread context of 628 1824 tmp.exe svchost.exe PID 1824 set thread context of 1192 1824 tmp.exe svchost.exe PID 636 set thread context of 948 636 svchost.exe svchost.exe PID 1192 set thread context of 1784 1192 svchost.exe svchost.exe PID 636 set thread context of 1120 636 svchost.exe svchost.exe PID 636 set thread context of 1644 636 svchost.exe svchost.exe PID 1192 set thread context of 1456 1192 svchost.exe svchost.exe PID 636 set thread context of 1672 636 svchost.exe svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
tmp.exepid process 1824 tmp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
tmp.exesvchost.exesvchost.exedescription pid process target process PID 1824 wrote to memory of 636 1824 tmp.exe svchost.exe PID 1824 wrote to memory of 636 1824 tmp.exe svchost.exe PID 1824 wrote to memory of 636 1824 tmp.exe svchost.exe PID 1824 wrote to memory of 636 1824 tmp.exe svchost.exe PID 1824 wrote to memory of 636 1824 tmp.exe svchost.exe PID 1824 wrote to memory of 636 1824 tmp.exe svchost.exe PID 1824 wrote to memory of 628 1824 tmp.exe svchost.exe PID 1824 wrote to memory of 628 1824 tmp.exe svchost.exe PID 1824 wrote to memory of 628 1824 tmp.exe svchost.exe PID 1824 wrote to memory of 628 1824 tmp.exe svchost.exe PID 1824 wrote to memory of 628 1824 tmp.exe svchost.exe PID 1824 wrote to memory of 628 1824 tmp.exe svchost.exe PID 636 wrote to memory of 948 636 svchost.exe svchost.exe PID 636 wrote to memory of 948 636 svchost.exe svchost.exe PID 636 wrote to memory of 948 636 svchost.exe svchost.exe PID 636 wrote to memory of 948 636 svchost.exe svchost.exe PID 1824 wrote to memory of 1192 1824 tmp.exe svchost.exe PID 1824 wrote to memory of 1192 1824 tmp.exe svchost.exe PID 1824 wrote to memory of 1192 1824 tmp.exe svchost.exe PID 1824 wrote to memory of 1192 1824 tmp.exe svchost.exe PID 1824 wrote to memory of 1192 1824 tmp.exe svchost.exe PID 1824 wrote to memory of 1192 1824 tmp.exe svchost.exe PID 636 wrote to memory of 948 636 svchost.exe svchost.exe PID 636 wrote to memory of 948 636 svchost.exe svchost.exe PID 1192 wrote to memory of 1784 1192 svchost.exe svchost.exe PID 1192 wrote to memory of 1784 1192 svchost.exe svchost.exe PID 1192 wrote to memory of 1784 1192 svchost.exe svchost.exe PID 1192 wrote to memory of 1784 1192 svchost.exe svchost.exe PID 1192 wrote to memory of 1784 1192 svchost.exe svchost.exe PID 1192 wrote to memory of 1784 1192 svchost.exe svchost.exe PID 636 wrote to memory of 948 636 svchost.exe svchost.exe PID 636 wrote to memory of 1120 636 svchost.exe svchost.exe PID 636 wrote to memory of 1120 636 svchost.exe svchost.exe PID 636 wrote to memory of 1120 636 svchost.exe svchost.exe PID 636 wrote to memory of 1120 636 svchost.exe svchost.exe PID 636 wrote to memory of 1120 636 svchost.exe svchost.exe PID 636 wrote to memory of 1120 636 svchost.exe svchost.exe PID 1192 wrote to memory of 1784 1192 svchost.exe svchost.exe PID 1192 wrote to memory of 1456 1192 svchost.exe svchost.exe PID 1192 wrote to memory of 1456 1192 svchost.exe svchost.exe PID 1192 wrote to memory of 1456 1192 svchost.exe svchost.exe PID 1192 wrote to memory of 1456 1192 svchost.exe svchost.exe PID 636 wrote to memory of 1120 636 svchost.exe svchost.exe PID 636 wrote to memory of 1644 636 svchost.exe svchost.exe PID 636 wrote to memory of 1644 636 svchost.exe svchost.exe PID 636 wrote to memory of 1644 636 svchost.exe svchost.exe PID 636 wrote to memory of 1644 636 svchost.exe svchost.exe PID 1192 wrote to memory of 1456 1192 svchost.exe svchost.exe PID 636 wrote to memory of 1644 636 svchost.exe svchost.exe PID 636 wrote to memory of 1644 636 svchost.exe svchost.exe PID 1192 wrote to memory of 1456 1192 svchost.exe svchost.exe PID 636 wrote to memory of 1644 636 svchost.exe svchost.exe PID 636 wrote to memory of 1672 636 svchost.exe svchost.exe PID 636 wrote to memory of 1672 636 svchost.exe svchost.exe PID 636 wrote to memory of 1672 636 svchost.exe svchost.exe PID 636 wrote to memory of 1672 636 svchost.exe svchost.exe PID 1192 wrote to memory of 1456 1192 svchost.exe svchost.exe PID 1192 wrote to memory of 2060 1192 svchost.exe svchost.exe PID 1192 wrote to memory of 2060 1192 svchost.exe svchost.exe PID 1192 wrote to memory of 2060 1192 svchost.exe svchost.exe PID 1192 wrote to memory of 2060 1192 svchost.exe svchost.exe PID 636 wrote to memory of 1672 636 svchost.exe svchost.exe PID 636 wrote to memory of 1672 636 svchost.exe svchost.exe PID 636 wrote to memory of 1672 636 svchost.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:948
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1120
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1644
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1672
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:628
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Adds Run key to start application
PID:1784 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Adds Run key to start application
PID:1456 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2060
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83B
MD5f3a1438ddf6ef1e54fb0db2b0839fd3b
SHA1bed5bb8e772b39ef9b34280a21426623aa83991e
SHA2569bbe3c56bf980ae8feed01429e1e9cd114e76f66b911458d01e3accdf8d71649
SHA512a35b793203f96bbebaec4c34ec1086cfa944d83a814f779a2815d7e2691c5027232d61e31a120c8f04d2a9f5fc885995e4e23ec837861397afbd1bee873626b5