Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
11-10-2021 15:34
Static task
static1
Behavioral task
behavioral1
Sample
0001.exe
Resource
win7-en-20210920
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
0001.exe
Resource
win10v20210408
0 signatures
0 seconds
General
-
Target
0001.exe
-
Size
3.8MB
-
MD5
9c6bda87c91a4bb5b1a70a76d7fe4486
-
SHA1
1732841f6f297ee0e596e36252c799922acc74ad
-
SHA256
8a82d9904985c9779c317052ad31585aacdf6b745b88a5ec3a8bcb697a8e9a8d
-
SHA512
e959b556796c9d5c152a38ab94398c5c4b23522ee2c991d7587484f7899582da485aacff67bb3e4e47d47c99f6a4d235f4ab5c05de4d41880b8d55ddef4b71ec
Score
10/10
Malware Config
Signatures
-
suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
-
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
Processes:
0001.exepid process 2032 0001.exe 2032 0001.exe 2032 0001.exe 2032 0001.exe 2032 0001.exe 2032 0001.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
0001.exedescription pid process Token: SeDebugPrivilege 2032 0001.exe Token: SeShutdownPrivilege 2032 0001.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
0001.exepid process 2032 0001.exe 2032 0001.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2032-53-0x0000000075821000-0x0000000075823000-memory.dmpFilesize
8KB