Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
26-07-2022 16:00
Behavioral task
behavioral1
Sample
c0aec085c4a40d42297566227d175847.exe
Resource
win7-20220715-en
windows7-x64
5 signatures
150 seconds
General
-
Target
c0aec085c4a40d42297566227d175847.exe
-
Size
1.4MB
-
MD5
c0aec085c4a40d42297566227d175847
-
SHA1
109514c9f0e1738b359db8623e3208c40f9dfd95
-
SHA256
614d76652c2200e394b860c180e9b44f3bccf99f172bea1469db0b9379c99dc2
-
SHA512
b9a11d46e2c40a2e7fcb782f321446f39f4f210e4f15e9433661ed8d9ce61d5f996bbde0dd3739a0046bbd7f43d47e7170b83d4a6b115a0cb03c132b19ecc57e
Malware Config
Extracted
Family
bitrat
Version
1.38
C2
bitm064.duckdns.org:7904
Attributes
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
tor_process
tor
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1848-55-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1848-58-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
c0aec085c4a40d42297566227d175847.exepid process 1848 c0aec085c4a40d42297566227d175847.exe 1848 c0aec085c4a40d42297566227d175847.exe 1848 c0aec085c4a40d42297566227d175847.exe 1848 c0aec085c4a40d42297566227d175847.exe 1848 c0aec085c4a40d42297566227d175847.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
c0aec085c4a40d42297566227d175847.exedescription pid process Token: SeDebugPrivilege 1848 c0aec085c4a40d42297566227d175847.exe Token: SeShutdownPrivilege 1848 c0aec085c4a40d42297566227d175847.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
c0aec085c4a40d42297566227d175847.exepid process 1848 c0aec085c4a40d42297566227d175847.exe 1848 c0aec085c4a40d42297566227d175847.exe