Analysis
-
max time kernel
119s -
max time network
150s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
09-11-2021 01:14
Static task
static1
Behavioral task
behavioral1
Sample
805b92787ca7833eef5e61e2df1310e4b6544955e812e60b5f834f904623fd9f.bin.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
805b92787ca7833eef5e61e2df1310e4b6544955e812e60b5f834f904623fd9f.bin.exe
Resource
win10-en-20211104
General
-
Target
805b92787ca7833eef5e61e2df1310e4b6544955e812e60b5f834f904623fd9f.bin.exe
-
Size
8.3MB
-
MD5
aedebba95462e9db10b834551e3abc03
-
SHA1
551c8f9200aa77d9bc94260a516522619016e2b7
-
SHA256
805b92787ca7833eef5e61e2df1310e4b6544955e812e60b5f834f904623fd9f
-
SHA512
e3928a34b18385ea8c43598bc13792b3f2d5b3f9cf0a2aa2b0bd0db666ad7e69d6cfdfb4d5dc07f086707156623462ce24432275a6d5bf08669478fe55954980
Malware Config
Signatures
-
GoLang User-Agent 18 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
Processes:
description flow ioc HTTP User-Agent header 17 Go-http-client/1.1 HTTP User-Agent header 20 Go-http-client/1.1 HTTP User-Agent header 22 Go-http-client/1.1 HTTP User-Agent header 23 Go-http-client/1.1 HTTP User-Agent header 10 Go-http-client/1.1 HTTP User-Agent header 11 Go-http-client/1.1 HTTP User-Agent header 15 Go-http-client/1.1 HTTP User-Agent header 16 Go-http-client/1.1 HTTP User-Agent header 18 Go-http-client/1.1 HTTP User-Agent header 21 Go-http-client/1.1 HTTP User-Agent header 8 Go-http-client/1.1 HTTP User-Agent header 14 Go-http-client/1.1 HTTP User-Agent header 4 Go-http-client/1.1 HTTP User-Agent header 7 Go-http-client/1.1 HTTP User-Agent header 12 Go-http-client/1.1 HTTP User-Agent header 13 Go-http-client/1.1 HTTP User-Agent header 19 Go-http-client/1.1 HTTP User-Agent header 24 Go-http-client/1.1 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
whoami.exedescription pid process Token: SeDebugPrivilege 972 whoami.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
805b92787ca7833eef5e61e2df1310e4b6544955e812e60b5f834f904623fd9f.bin.execmd.exedescription pid process target process PID 268 wrote to memory of 1424 268 805b92787ca7833eef5e61e2df1310e4b6544955e812e60b5f834f904623fd9f.bin.exe cmd.exe PID 268 wrote to memory of 1424 268 805b92787ca7833eef5e61e2df1310e4b6544955e812e60b5f834f904623fd9f.bin.exe cmd.exe PID 268 wrote to memory of 1424 268 805b92787ca7833eef5e61e2df1310e4b6544955e812e60b5f834f904623fd9f.bin.exe cmd.exe PID 268 wrote to memory of 1424 268 805b92787ca7833eef5e61e2df1310e4b6544955e812e60b5f834f904623fd9f.bin.exe cmd.exe PID 1424 wrote to memory of 972 1424 cmd.exe whoami.exe PID 1424 wrote to memory of 972 1424 cmd.exe whoami.exe PID 1424 wrote to memory of 972 1424 cmd.exe whoami.exe PID 1424 wrote to memory of 972 1424 cmd.exe whoami.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\805b92787ca7833eef5e61e2df1310e4b6544955e812e60b5f834f904623fd9f.bin.exe"C:\Users\Admin\AppData\Local\Temp\805b92787ca7833eef5e61e2df1310e4b6544955e812e60b5f834f904623fd9f.bin.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\SysWOW64\cmd.execmd /c whoami2⤵
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\whoami.exewhoami3⤵
- Suspicious use of AdjustPrivilegeToken
PID:972
-
-