Analysis
-
max time kernel
300s -
max time network
301s -
platform
windows10_x64 -
resource
win10-20220414-en -
resource tags
arch:x64arch:x86image:win10-20220414-enlocale:en-usos:windows10-1703-x64system -
submitted
28-07-2022 22:18
Behavioral task
behavioral1
Sample
772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe
Resource
win10-20220414-en
General
-
Target
772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe
-
Size
1.4MB
-
MD5
c8fa9d8cf4ff8780466a34d8d5d43594
-
SHA1
1902971da5e39dccc308207ab77a7e1c987c31cd
-
SHA256
772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214
-
SHA512
9a87c3fc220fdc6f959fb9a5bfe6b526a003a4d1fd473581ba3d044bdf4cb3fffe531a5b56b87ea243a787da80a10372ff932457f069dd174be9654681f44c03
Malware Config
Extracted
bitrat
1.38
nicehash.at:6000
-
communication_password
74963e9852aafd36ba521fa22b39e244
-
install_dir
localappdata
-
install_file
Java.exe
-
tor_process
tor
Signatures
-
Processes:
resource yara_rule behavioral2/memory/808-125-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/808-182-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java = "C:\\Users\\Admin\\AppData\\Local\\localappdata\\Java.exe" 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java = "C:\\Users\\Admin\\AppData\\Local\\localappdata\\Java.exe퀀" 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java = "C:\\Users\\Admin\\AppData\\Local\\localappdata\\Java.exe眀" 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
Processes:
772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exepid process 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe -
Suspicious behavior: RenamesItself 58 IoCs
Processes:
772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exepid process 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exedescription pid process Token: SeShutdownPrivilege 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exepid process 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe 808 772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe"C:\Users\Admin\AppData\Local\Temp\772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/808-118-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-119-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-120-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-121-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-122-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-123-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-125-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/808-124-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-126-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-127-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-128-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-129-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-130-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-131-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-132-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-133-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-134-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-135-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-136-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-137-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-138-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-139-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-140-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-141-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-142-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-143-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-144-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-145-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-146-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-147-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-148-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-149-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-150-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-151-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-152-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-153-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-154-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-155-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-156-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-157-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-158-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-159-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-160-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-161-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-162-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-163-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-164-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-165-0x00000000739E0000-0x0000000073A1A000-memory.dmpFilesize
232KB
-
memory/808-166-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-167-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-168-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-169-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-170-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-171-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-172-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-173-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-174-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-175-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-177-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-176-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-178-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-179-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-180-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-181-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-182-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/808-183-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-184-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/808-216-0x00000000739E0000-0x0000000073A1A000-memory.dmpFilesize
232KB
-
memory/808-233-0x00000000739E0000-0x0000000073A1A000-memory.dmpFilesize
232KB
-
memory/808-234-0x00000000739E0000-0x0000000073A1A000-memory.dmpFilesize
232KB
-
memory/808-235-0x00000000739E0000-0x0000000073A1A000-memory.dmpFilesize
232KB
-
memory/808-252-0x00000000739E0000-0x0000000073A1A000-memory.dmpFilesize
232KB
-
memory/808-253-0x00000000739E0000-0x0000000073A1A000-memory.dmpFilesize
232KB
-
memory/808-270-0x00000000739E0000-0x0000000073A1A000-memory.dmpFilesize
232KB
-
memory/808-271-0x00000000739E0000-0x0000000073A1A000-memory.dmpFilesize
232KB