Analysis
-
max time kernel
20s -
max time network
115s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
12-04-2021 08:03
Static task
static1
Behavioral task
behavioral1
Sample
bfca5d2ddd8840dc1f6c49309bbe1924.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
bfca5d2ddd8840dc1f6c49309bbe1924.exe
-
Size
1.1MB
-
MD5
bfca5d2ddd8840dc1f6c49309bbe1924
-
SHA1
b0f0462dfa8fd68617a7e458f9f24586177b3ed2
-
SHA256
ef1bc7566ce113d6af42b9eecc63f0b69b3eeebcc2896d63bf948be6c295dc3a
-
SHA512
8c54c8a7a37c637dc6bde8603433b5da536a796aaccc19e22c1e781a9907e6d891b49bbf051837719ca582f3f1e154851ab82d1a53eb47ab2a882caf3c14dda7
Malware Config
Signatures
-
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral2/memory/3108-120-0x0000000004E50000-0x0000000004E5B000-memory.dmp agile_net -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
bfca5d2ddd8840dc1f6c49309bbe1924.exedescription pid process target process PID 3108 set thread context of 2888 3108 bfca5d2ddd8840dc1f6c49309bbe1924.exe AddInProcess32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AddInProcess32.exepid process 2888 AddInProcess32.exe 2888 AddInProcess32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
bfca5d2ddd8840dc1f6c49309bbe1924.exeAddInProcess32.exedescription pid process Token: SeDebugPrivilege 3108 bfca5d2ddd8840dc1f6c49309bbe1924.exe Token: SeDebugPrivilege 2888 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
bfca5d2ddd8840dc1f6c49309bbe1924.exedescription pid process target process PID 3108 wrote to memory of 2888 3108 bfca5d2ddd8840dc1f6c49309bbe1924.exe AddInProcess32.exe PID 3108 wrote to memory of 2888 3108 bfca5d2ddd8840dc1f6c49309bbe1924.exe AddInProcess32.exe PID 3108 wrote to memory of 2888 3108 bfca5d2ddd8840dc1f6c49309bbe1924.exe AddInProcess32.exe PID 3108 wrote to memory of 2888 3108 bfca5d2ddd8840dc1f6c49309bbe1924.exe AddInProcess32.exe PID 3108 wrote to memory of 2888 3108 bfca5d2ddd8840dc1f6c49309bbe1924.exe AddInProcess32.exe PID 3108 wrote to memory of 2888 3108 bfca5d2ddd8840dc1f6c49309bbe1924.exe AddInProcess32.exe PID 3108 wrote to memory of 2888 3108 bfca5d2ddd8840dc1f6c49309bbe1924.exe AddInProcess32.exe PID 3108 wrote to memory of 2888 3108 bfca5d2ddd8840dc1f6c49309bbe1924.exe AddInProcess32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfca5d2ddd8840dc1f6c49309bbe1924.exe"C:\Users\Admin\AppData\Local\Temp\bfca5d2ddd8840dc1f6c49309bbe1924.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2888
-