Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2022 14:21
Static task
static1
Behavioral task
behavioral1
Sample
Order #115-46CYP-6543893216.exe
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
General
-
Target
Order #115-46CYP-6543893216.exe
-
Size
391KB
-
MD5
e89986dbfdef6f38249ad35a87d93f33
-
SHA1
6c78e1cb8b361c4dba18451a12d42901c0a97ca1
-
SHA256
9c457ce3eb5b5b0456c80609b512040696acab4f47d7b6879f0200e1b8501075
-
SHA512
02188eaeb964750e666c9aff416d4a93d88a7d5f887d8c6a73066629f2f0ed101ee4ecb135a19664f83aeebf8ae0b7c40d177d3c34bc422c8b73f9c55d046e0b
-
SSDEEP
6144:xXifTDZUEd5UT2AyvSlKkl8ftbFq65LhhZMEUcQQiW:ADj9Nv0K5tbFq6xh8W
Malware Config
Extracted
Family
bitrat
Version
1.38
C2
febbit2.ddns.net:6655
Attributes
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
tor_process
tor
Signatures
-
Downloads MZ/PE file
-
Processes:
resource yara_rule behavioral2/memory/3768-137-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3768-139-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3768-138-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3768-140-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3768-141-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3768-144-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
RegAsm.exepid process 3768 RegAsm.exe 3768 RegAsm.exe 3768 RegAsm.exe 3768 RegAsm.exe 3768 RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Order #115-46CYP-6543893216.exedescription pid process target process PID 3188 set thread context of 3768 3188 Order #115-46CYP-6543893216.exe RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Order #115-46CYP-6543893216.exeRegAsm.exedescription pid process Token: SeDebugPrivilege 3188 Order #115-46CYP-6543893216.exe Token: SeShutdownPrivilege 3768 RegAsm.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
RegAsm.exepid process 3768 RegAsm.exe 3768 RegAsm.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
Order #115-46CYP-6543893216.exedescription pid process target process PID 3188 wrote to memory of 3768 3188 Order #115-46CYP-6543893216.exe RegAsm.exe PID 3188 wrote to memory of 3768 3188 Order #115-46CYP-6543893216.exe RegAsm.exe PID 3188 wrote to memory of 3768 3188 Order #115-46CYP-6543893216.exe RegAsm.exe PID 3188 wrote to memory of 3768 3188 Order #115-46CYP-6543893216.exe RegAsm.exe PID 3188 wrote to memory of 3768 3188 Order #115-46CYP-6543893216.exe RegAsm.exe PID 3188 wrote to memory of 3768 3188 Order #115-46CYP-6543893216.exe RegAsm.exe PID 3188 wrote to memory of 3768 3188 Order #115-46CYP-6543893216.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Order #115-46CYP-6543893216.exe"C:\Users\Admin\AppData\Local\Temp\Order #115-46CYP-6543893216.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3768