Analysis
-
max time kernel
148s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
28-07-2022 21:57
Behavioral task
behavioral1
Sample
141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe
Resource
win10v2004-20220721-en
General
-
Target
141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe
-
Size
1.4MB
-
MD5
c8fa9d8cf4ff8780466a34d8d5d43594
-
SHA1
1902971da5e39dccc308207ab77a7e1c987c31cd
-
SHA256
772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214
-
SHA512
9a87c3fc220fdc6f959fb9a5bfe6b526a003a4d1fd473581ba3d044bdf4cb3fffe531a5b56b87ea243a787da80a10372ff932457f069dd174be9654681f44c03
Malware Config
Extracted
bitrat
1.38
nicehash.at:6000
-
communication_password
74963e9852aafd36ba521fa22b39e244
-
install_dir
localappdata
-
install_file
Java.exe
-
tor_process
tor
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1428-55-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1428-58-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java = "C:\\Users\\Admin\\AppData\\Local\\localappdata\\Java.exe" 141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
Processes:
141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exepid process 1428 141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe 1428 141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe 1428 141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe 1428 141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe 1428 141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe 1428 141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe -
Suspicious behavior: RenamesItself 26 IoCs
Processes:
141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exepid process 1428 141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe 1428 141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe 1428 141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe 1428 141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe 1428 141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe 1428 141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe 1428 141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe 1428 141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe 1428 141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe 1428 141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe 1428 141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe 1428 141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe 1428 141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe 1428 141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe 1428 141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe 1428 141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe 1428 141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe 1428 141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe 1428 141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe 1428 141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe 1428 141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe 1428 141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe 1428 141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe 1428 141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe 1428 141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe 1428 141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exedescription pid process Token: SeDebugPrivilege 1428 141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe Token: SeShutdownPrivilege 1428 141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exepid process 1428 141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe 1428 141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe"C:\Users\Admin\AppData\Local\Temp\141.98.6.67_-_bit.exe___c8fa9d8cf4ff8780466a34d8d5d43594.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1428