Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07-11-2022 06:51
Behavioral task
behavioral1
Sample
abc00d610ca15f87ed9a9dc311160ce643f849635534900235e293828fb0c9d4.exe
Resource
win7-20220901-en
windows7-x64
4 signatures
150 seconds
General
-
Target
abc00d610ca15f87ed9a9dc311160ce643f849635534900235e293828fb0c9d4.exe
-
Size
3.8MB
-
MD5
ab4330a902cc9dc1506f85b8e785a040
-
SHA1
343fbf33a768b62a88a7cd2634394cd4c544431d
-
SHA256
abc00d610ca15f87ed9a9dc311160ce643f849635534900235e293828fb0c9d4
-
SHA512
7d580260b8c53bad3e0fd5c8c2b9e3bed75d9db5365d31ee500b16f2a3a2a62a1163d7632cc2aea60f27ad5a53f4e3cb6caf8a2ed38b865654ad768e431cd4cd
-
SSDEEP
98304:X77Pmq33rE/JDLPWZADUGer7B6iY74M/qmlwXVZ:f+R/eZADUXR
Malware Config
Extracted
Family
bitrat
Version
1.38
C2
212.192.241.19:4898
Attributes
-
communication_password
827ccb0eea8a706c4c34a16891f84e7b
-
tor_process
tor
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
abc00d610ca15f87ed9a9dc311160ce643f849635534900235e293828fb0c9d4.exepid process 1720 abc00d610ca15f87ed9a9dc311160ce643f849635534900235e293828fb0c9d4.exe 1720 abc00d610ca15f87ed9a9dc311160ce643f849635534900235e293828fb0c9d4.exe 1720 abc00d610ca15f87ed9a9dc311160ce643f849635534900235e293828fb0c9d4.exe 1720 abc00d610ca15f87ed9a9dc311160ce643f849635534900235e293828fb0c9d4.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
abc00d610ca15f87ed9a9dc311160ce643f849635534900235e293828fb0c9d4.exedescription pid process Token: SeDebugPrivilege 1720 abc00d610ca15f87ed9a9dc311160ce643f849635534900235e293828fb0c9d4.exe Token: SeShutdownPrivilege 1720 abc00d610ca15f87ed9a9dc311160ce643f849635534900235e293828fb0c9d4.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
abc00d610ca15f87ed9a9dc311160ce643f849635534900235e293828fb0c9d4.exepid process 1720 abc00d610ca15f87ed9a9dc311160ce643f849635534900235e293828fb0c9d4.exe 1720 abc00d610ca15f87ed9a9dc311160ce643f849635534900235e293828fb0c9d4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\abc00d610ca15f87ed9a9dc311160ce643f849635534900235e293828fb0c9d4.exe"C:\Users\Admin\AppData\Local\Temp\abc00d610ca15f87ed9a9dc311160ce643f849635534900235e293828fb0c9d4.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1720