Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
24-06-2022 06:39
Static task
static1
Behavioral task
behavioral1
Sample
PO#W056931PDF.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
PO#W056931PDF.exe
-
Size
1.8MB
-
MD5
1fe364ea6a61d9030191db48309cd0c1
-
SHA1
b16caf8eb59c391670ff34e9d7ad0502c9c27012
-
SHA256
970406f2773fbbfc31cf831fb6c5de0b4fbc206e5f5fa9c93ad06e1209bda266
-
SHA512
306278cdf03441afb2aa57792c96d1802906799d086d644feab0843ec0eef216df06ae02ac59663258423408f8686d6d7076ca41764bff8296fcdf8ab0f7050b
Malware Config
Extracted
Family
bitrat
Version
1.38
C2
godfavor.duckdns.org:2349
Attributes
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
tor_process
tor
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3596-137-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3596-138-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3596-139-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3596-140-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3596-141-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3596-145-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
PO#W056931PDF.exepid process 3596 PO#W056931PDF.exe 3596 PO#W056931PDF.exe 3596 PO#W056931PDF.exe 3596 PO#W056931PDF.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
PO#W056931PDF.exedescription pid process target process PID 3276 set thread context of 3596 3276 PO#W056931PDF.exe PO#W056931PDF.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
PO#W056931PDF.exepid process 3276 PO#W056931PDF.exe 3276 PO#W056931PDF.exe 3276 PO#W056931PDF.exe 3276 PO#W056931PDF.exe 3276 PO#W056931PDF.exe 3276 PO#W056931PDF.exe 3276 PO#W056931PDF.exe 3276 PO#W056931PDF.exe 3276 PO#W056931PDF.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
PO#W056931PDF.exePO#W056931PDF.exedescription pid process Token: SeDebugPrivilege 3276 PO#W056931PDF.exe Token: SeShutdownPrivilege 3596 PO#W056931PDF.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
PO#W056931PDF.exepid process 3596 PO#W056931PDF.exe 3596 PO#W056931PDF.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
PO#W056931PDF.exedescription pid process target process PID 3276 wrote to memory of 4336 3276 PO#W056931PDF.exe PO#W056931PDF.exe PID 3276 wrote to memory of 4336 3276 PO#W056931PDF.exe PO#W056931PDF.exe PID 3276 wrote to memory of 4336 3276 PO#W056931PDF.exe PO#W056931PDF.exe PID 3276 wrote to memory of 3596 3276 PO#W056931PDF.exe PO#W056931PDF.exe PID 3276 wrote to memory of 3596 3276 PO#W056931PDF.exe PO#W056931PDF.exe PID 3276 wrote to memory of 3596 3276 PO#W056931PDF.exe PO#W056931PDF.exe PID 3276 wrote to memory of 3596 3276 PO#W056931PDF.exe PO#W056931PDF.exe PID 3276 wrote to memory of 3596 3276 PO#W056931PDF.exe PO#W056931PDF.exe PID 3276 wrote to memory of 3596 3276 PO#W056931PDF.exe PO#W056931PDF.exe PID 3276 wrote to memory of 3596 3276 PO#W056931PDF.exe PO#W056931PDF.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO#W056931PDF.exe"C:\Users\Admin\AppData\Local\Temp\PO#W056931PDF.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\PO#W056931PDF.exe"C:\Users\Admin\AppData\Local\Temp\PO#W056931PDF.exe"2⤵PID:4336
-
-
C:\Users\Admin\AppData\Local\Temp\PO#W056931PDF.exe"C:\Users\Admin\AppData\Local\Temp\PO#W056931PDF.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3596
-