Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
09-08-2022 08:38
Static task
static1
Behavioral task
behavioral1
Sample
oka.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
oka.exe
Resource
win10v2004-20220721-en
General
-
Target
oka.exe
-
Size
1.7MB
-
MD5
09cf009d15f845497667171a11a51fd3
-
SHA1
c45fdc8dacdf6901e81185ff684d3deda57af6e7
-
SHA256
d3ddf40b5133634e7b56f9532035264723ac3006442f82f1af013c88f581ad22
-
SHA512
75424b3572e63f8eb19b6c8cbc5c987354f7db8bb4d32e8f3a5c74fee8144b8ec717bc4422ac090b2763b5e10917927c7a8c136e23832a7362646b33a9c903c0
Malware Config
Extracted
bitrat
1.38
yakbitpeople.duckdns.org:9175
-
communication_password
827ccb0eea8a706c4c34a16891f84e7b
-
tor_process
tor
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 1204 svchost.exe -
Processes:
resource yara_rule behavioral1/memory/1140-59-0x0000000000410000-0x00000000007F4000-memory.dmp upx behavioral1/memory/1140-62-0x0000000000410000-0x00000000007F4000-memory.dmp upx behavioral1/memory/1140-64-0x0000000000410000-0x00000000007F4000-memory.dmp upx behavioral1/memory/1140-67-0x0000000000410000-0x00000000007F4000-memory.dmp upx behavioral1/memory/1140-72-0x0000000000410000-0x00000000007F4000-memory.dmp upx behavioral1/memory/1140-75-0x0000000000410000-0x00000000007F4000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
RegAsm.exepid process 1140 RegAsm.exe 1140 RegAsm.exe 1140 RegAsm.exe 1140 RegAsm.exe 1140 RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
oka.exedescription pid process target process PID 1948 set thread context of 1140 1948 oka.exe RegAsm.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
oka.exeRegAsm.exesvchost.exedescription pid process Token: SeDebugPrivilege 1948 oka.exe Token: SeDebugPrivilege 1140 RegAsm.exe Token: SeShutdownPrivilege 1140 RegAsm.exe Token: SeDebugPrivilege 1204 svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
RegAsm.exepid process 1140 RegAsm.exe 1140 RegAsm.exe -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
oka.execmd.exetaskeng.exedescription pid process target process PID 1948 wrote to memory of 1140 1948 oka.exe RegAsm.exe PID 1948 wrote to memory of 1140 1948 oka.exe RegAsm.exe PID 1948 wrote to memory of 1140 1948 oka.exe RegAsm.exe PID 1948 wrote to memory of 1140 1948 oka.exe RegAsm.exe PID 1948 wrote to memory of 1140 1948 oka.exe RegAsm.exe PID 1948 wrote to memory of 1140 1948 oka.exe RegAsm.exe PID 1948 wrote to memory of 1140 1948 oka.exe RegAsm.exe PID 1948 wrote to memory of 1140 1948 oka.exe RegAsm.exe PID 1948 wrote to memory of 1140 1948 oka.exe RegAsm.exe PID 1948 wrote to memory of 1140 1948 oka.exe RegAsm.exe PID 1948 wrote to memory of 1140 1948 oka.exe RegAsm.exe PID 1948 wrote to memory of 1060 1948 oka.exe cmd.exe PID 1948 wrote to memory of 1060 1948 oka.exe cmd.exe PID 1948 wrote to memory of 1060 1948 oka.exe cmd.exe PID 1948 wrote to memory of 1060 1948 oka.exe cmd.exe PID 1948 wrote to memory of 764 1948 oka.exe cmd.exe PID 1948 wrote to memory of 764 1948 oka.exe cmd.exe PID 1948 wrote to memory of 764 1948 oka.exe cmd.exe PID 1948 wrote to memory of 764 1948 oka.exe cmd.exe PID 764 wrote to memory of 672 764 cmd.exe schtasks.exe PID 764 wrote to memory of 672 764 cmd.exe schtasks.exe PID 764 wrote to memory of 672 764 cmd.exe schtasks.exe PID 764 wrote to memory of 672 764 cmd.exe schtasks.exe PID 1948 wrote to memory of 796 1948 oka.exe cmd.exe PID 1948 wrote to memory of 796 1948 oka.exe cmd.exe PID 1948 wrote to memory of 796 1948 oka.exe cmd.exe PID 1948 wrote to memory of 796 1948 oka.exe cmd.exe PID 1516 wrote to memory of 1204 1516 taskeng.exe svchost.exe PID 1516 wrote to memory of 1204 1516 taskeng.exe svchost.exe PID 1516 wrote to memory of 1204 1516 taskeng.exe svchost.exe PID 1516 wrote to memory of 1204 1516 taskeng.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\oka.exe"C:\Users\Admin\AppData\Local\Temp\oka.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1140
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\svchost"2⤵PID:1060
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\svchost\svchost.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\svchost\svchost.exe'" /f3⤵
- Creates scheduled task(s)
PID:672
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\oka.exe" "C:\Users\Admin\AppData\Roaming\svchost\svchost.exe"2⤵PID:796
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {5AC6CC32-88CA-4CFD-97BD-5B0BFDEC7747} S-1-5-21-4084403625-2215941253-1760665084-1000:LDLTPJLN\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Roaming\svchost\svchost.exeC:\Users\Admin\AppData\Roaming\svchost\svchost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1204
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD509cf009d15f845497667171a11a51fd3
SHA1c45fdc8dacdf6901e81185ff684d3deda57af6e7
SHA256d3ddf40b5133634e7b56f9532035264723ac3006442f82f1af013c88f581ad22
SHA51275424b3572e63f8eb19b6c8cbc5c987354f7db8bb4d32e8f3a5c74fee8144b8ec717bc4422ac090b2763b5e10917927c7a8c136e23832a7362646b33a9c903c0
-
Filesize
1.7MB
MD509cf009d15f845497667171a11a51fd3
SHA1c45fdc8dacdf6901e81185ff684d3deda57af6e7
SHA256d3ddf40b5133634e7b56f9532035264723ac3006442f82f1af013c88f581ad22
SHA51275424b3572e63f8eb19b6c8cbc5c987354f7db8bb4d32e8f3a5c74fee8144b8ec717bc4422ac090b2763b5e10917927c7a8c136e23832a7362646b33a9c903c0