Analysis
-
max time kernel
173s -
max time network
170s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
21-01-2022 23:06
Static task
static1
Behavioral task
behavioral1
Sample
d38c5450042d5abed1dc9fb3ad31dace57016abad7365d16aab59982c61b9fec.exe
Resource
win7-en-20211208
General
-
Target
d38c5450042d5abed1dc9fb3ad31dace57016abad7365d16aab59982c61b9fec.exe
-
Size
2.2MB
-
MD5
7545c015bd1feba22347fcbe6e5e0a86
-
SHA1
bcb1fd3b33f243ca8e2f3ac87e2700be8e04d002
-
SHA256
d38c5450042d5abed1dc9fb3ad31dace57016abad7365d16aab59982c61b9fec
-
SHA512
505b1867673c86e654cdd369332bad493100fb37d9f24cbe91855c98c2d70022eea92ec0eff6ea52f8eb723096d2709cb87e15f55701d834d213bf72619d16ed
Malware Config
Extracted
bitrat
1.35
publiquilla.linkpc.net:9096
-
communication_password
bfdba24ee3d61f0260c4dc1034c3ee43
-
install_dir
antivirusscamdefenderlogss
-
install_file
antivirusscamdefenderlog.exe
-
tor_process
tor
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3012-125-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3012-126-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3012-127-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
Processes:
d38c5450042d5abed1dc9fb3ad31dace57016abad7365d16aab59982c61b9fec.exedescription pid process target process PID 2720 set thread context of 3012 2720 d38c5450042d5abed1dc9fb3ad31dace57016abad7365d16aab59982c61b9fec.exe d38c5450042d5abed1dc9fb3ad31dace57016abad7365d16aab59982c61b9fec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
d38c5450042d5abed1dc9fb3ad31dace57016abad7365d16aab59982c61b9fec.exedescription pid process target process PID 2720 wrote to memory of 3012 2720 d38c5450042d5abed1dc9fb3ad31dace57016abad7365d16aab59982c61b9fec.exe d38c5450042d5abed1dc9fb3ad31dace57016abad7365d16aab59982c61b9fec.exe PID 2720 wrote to memory of 3012 2720 d38c5450042d5abed1dc9fb3ad31dace57016abad7365d16aab59982c61b9fec.exe d38c5450042d5abed1dc9fb3ad31dace57016abad7365d16aab59982c61b9fec.exe PID 2720 wrote to memory of 3012 2720 d38c5450042d5abed1dc9fb3ad31dace57016abad7365d16aab59982c61b9fec.exe d38c5450042d5abed1dc9fb3ad31dace57016abad7365d16aab59982c61b9fec.exe PID 2720 wrote to memory of 3012 2720 d38c5450042d5abed1dc9fb3ad31dace57016abad7365d16aab59982c61b9fec.exe d38c5450042d5abed1dc9fb3ad31dace57016abad7365d16aab59982c61b9fec.exe PID 2720 wrote to memory of 3012 2720 d38c5450042d5abed1dc9fb3ad31dace57016abad7365d16aab59982c61b9fec.exe d38c5450042d5abed1dc9fb3ad31dace57016abad7365d16aab59982c61b9fec.exe PID 2720 wrote to memory of 3012 2720 d38c5450042d5abed1dc9fb3ad31dace57016abad7365d16aab59982c61b9fec.exe d38c5450042d5abed1dc9fb3ad31dace57016abad7365d16aab59982c61b9fec.exe PID 2720 wrote to memory of 3012 2720 d38c5450042d5abed1dc9fb3ad31dace57016abad7365d16aab59982c61b9fec.exe d38c5450042d5abed1dc9fb3ad31dace57016abad7365d16aab59982c61b9fec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d38c5450042d5abed1dc9fb3ad31dace57016abad7365d16aab59982c61b9fec.exe"C:\Users\Admin\AppData\Local\Temp\d38c5450042d5abed1dc9fb3ad31dace57016abad7365d16aab59982c61b9fec.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\d38c5450042d5abed1dc9fb3ad31dace57016abad7365d16aab59982c61b9fec.exe"C:\Users\Admin\AppData\Local\Temp\d38c5450042d5abed1dc9fb3ad31dace57016abad7365d16aab59982c61b9fec.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2720-115-0x00000000006C0000-0x00000000008EE000-memory.dmpFilesize
2.2MB
-
memory/2720-116-0x0000000005140000-0x00000000051DC000-memory.dmpFilesize
624KB
-
memory/2720-117-0x00000000056E0000-0x0000000005BDE000-memory.dmpFilesize
5.0MB
-
memory/2720-118-0x00000000051E0000-0x0000000005272000-memory.dmpFilesize
584KB
-
memory/2720-119-0x00000000051E0000-0x00000000056DE000-memory.dmpFilesize
5.0MB
-
memory/2720-120-0x00000000050F0000-0x00000000050FA000-memory.dmpFilesize
40KB
-
memory/2720-121-0x0000000005400000-0x0000000005456000-memory.dmpFilesize
344KB
-
memory/2720-122-0x0000000005380000-0x0000000005394000-memory.dmpFilesize
80KB
-
memory/2720-123-0x0000000006250000-0x000000000643C000-memory.dmpFilesize
1.9MB
-
memory/2720-124-0x0000000009820000-0x00000000099BC000-memory.dmpFilesize
1.6MB
-
memory/3012-125-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/3012-126-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/3012-127-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB