Analysis
-
max time kernel
129s -
max time network
130s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
12-04-2021 08:03
Static task
static1
Behavioral task
behavioral1
Sample
bfca5d2ddd8840dc1f6c49309bbe1924.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
bfca5d2ddd8840dc1f6c49309bbe1924.exe
-
Size
1.1MB
-
MD5
bfca5d2ddd8840dc1f6c49309bbe1924
-
SHA1
b0f0462dfa8fd68617a7e458f9f24586177b3ed2
-
SHA256
ef1bc7566ce113d6af42b9eecc63f0b69b3eeebcc2896d63bf948be6c295dc3a
-
SHA512
8c54c8a7a37c637dc6bde8603433b5da536a796aaccc19e22c1e781a9907e6d891b49bbf051837719ca582f3f1e154851ab82d1a53eb47ab2a882caf3c14dda7
Malware Config
Signatures
-
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/1984-63-0x0000000000A10000-0x0000000000A1B000-memory.dmp agile_net -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
bfca5d2ddd8840dc1f6c49309bbe1924.exedescription pid Process procid_target PID 1984 set thread context of 1656 1984 bfca5d2ddd8840dc1f6c49309bbe1924.exe 29 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AddInProcess32.exepid Process 1656 AddInProcess32.exe 1656 AddInProcess32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
bfca5d2ddd8840dc1f6c49309bbe1924.exeAddInProcess32.exedescription pid Process Token: SeDebugPrivilege 1984 bfca5d2ddd8840dc1f6c49309bbe1924.exe Token: SeDebugPrivilege 1656 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
bfca5d2ddd8840dc1f6c49309bbe1924.exedescription pid Process procid_target PID 1984 wrote to memory of 1656 1984 bfca5d2ddd8840dc1f6c49309bbe1924.exe 29 PID 1984 wrote to memory of 1656 1984 bfca5d2ddd8840dc1f6c49309bbe1924.exe 29 PID 1984 wrote to memory of 1656 1984 bfca5d2ddd8840dc1f6c49309bbe1924.exe 29 PID 1984 wrote to memory of 1656 1984 bfca5d2ddd8840dc1f6c49309bbe1924.exe 29 PID 1984 wrote to memory of 1656 1984 bfca5d2ddd8840dc1f6c49309bbe1924.exe 29 PID 1984 wrote to memory of 1656 1984 bfca5d2ddd8840dc1f6c49309bbe1924.exe 29 PID 1984 wrote to memory of 1656 1984 bfca5d2ddd8840dc1f6c49309bbe1924.exe 29 PID 1984 wrote to memory of 1656 1984 bfca5d2ddd8840dc1f6c49309bbe1924.exe 29 PID 1984 wrote to memory of 1656 1984 bfca5d2ddd8840dc1f6c49309bbe1924.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfca5d2ddd8840dc1f6c49309bbe1924.exe"C:\Users\Admin\AppData\Local\Temp\bfca5d2ddd8840dc1f6c49309bbe1924.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1656
-