Analysis
-
max time kernel
165s -
max time network
170s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
30-01-2022 15:11
Static task
static1
Behavioral task
behavioral1
Sample
44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exe
Resource
win10-en-20211208
General
-
Target
44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exe
-
Size
2.1MB
-
MD5
8f80b1aa1c993a8be187868cd3b6f5fc
-
SHA1
a1b1959ea2f410aa40e09f73e6522fe89969c6c5
-
SHA256
44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3
-
SHA512
344da2dcb5643e558ea52cf5b7728180359e04bc6179cda768438c205787e8e7c474952afb3c9d1fd63a7879be213b8bc41fc090248a63f5fa2201b7199a0ad3
Malware Config
Extracted
bitrat
1.35
publiquilla.linkpc.net:9095
-
communication_password
bfdba24ee3d61f0260c4dc1034c3ee43
-
install_dir
antimalawaresdystemlogomn
-
install_file
antimalawaresdystem.exe
-
tor_process
tor
Signatures
-
Processes:
resource yara_rule behavioral2/memory/856-126-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/856-127-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/856-128-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\antimalawaresdystem = "C:\\Users\\Admin\\AppData\\Local\\antimalawaresdystemlogomn\\antimalawaresdystem.exe" 44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exepid process 856 44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exe 856 44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exe 856 44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exe 856 44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exedescription pid process target process PID 1692 set thread context of 856 1692 44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exe 44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exe -
Suspicious behavior: RenamesItself 4 IoCs
Processes:
44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exepid process 856 44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exe 856 44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exe 856 44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exe 856 44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exedescription pid process Token: SeShutdownPrivilege 856 44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exepid process 856 44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exe 856 44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exedescription pid process target process PID 1692 wrote to memory of 856 1692 44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exe 44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exe PID 1692 wrote to memory of 856 1692 44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exe 44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exe PID 1692 wrote to memory of 856 1692 44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exe 44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exe PID 1692 wrote to memory of 856 1692 44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exe 44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exe PID 1692 wrote to memory of 856 1692 44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exe 44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exe PID 1692 wrote to memory of 856 1692 44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exe 44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exe PID 1692 wrote to memory of 856 1692 44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exe 44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exe"C:\Users\Admin\AppData\Local\Temp\44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exe"C:\Users\Admin\AppData\Local\Temp\44695a8503106b29067a702055ada74185c5072db375409f7cc8f36a64a7e4f3.exe"2⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/856-126-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/856-127-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/856-128-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1692-118-0x00000000007F0000-0x0000000000A14000-memory.dmpFilesize
2.1MB
-
memory/1692-119-0x0000000005450000-0x0000000005451000-memory.dmpFilesize
4KB
-
memory/1692-120-0x0000000005530000-0x00000000055C2000-memory.dmpFilesize
584KB
-
memory/1692-121-0x00000000055D0000-0x000000000566C000-memory.dmpFilesize
624KB
-
memory/1692-122-0x0000000005470000-0x0000000005484000-memory.dmpFilesize
80KB
-
memory/1692-123-0x0000000005DF0000-0x00000000062EE000-memory.dmpFilesize
5.0MB
-
memory/1692-124-0x0000000006700000-0x0000000006900000-memory.dmpFilesize
2.0MB
-
memory/1692-125-0x0000000009BB0000-0x0000000009D62000-memory.dmpFilesize
1.7MB