Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2022 02:58
Static task
static1
Behavioral task
behavioral1
Sample
BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe
Resource
win10v2004-20220812-en
General
-
Target
BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe
-
Size
2.1MB
-
MD5
8d832de194971baab3c3094332b3711a
-
SHA1
bd9664f567cbd520672515aeafa435523e0d6086
-
SHA256
bb6d55aab2282e95e85afa000473a6df2f1a4b4c46f177c14cfbf3e8e48b430d
-
SHA512
5ad34a2da576787bcfd1b4b7e224e93968dab3d48cc02b9eaddd9e4df586a9532c8d6d412471dbd5c7181e58dd6d1d04cb8bfd972b617d7468009e1b4efddead
-
SSDEEP
49152:vjhtoUsQI6Jc41u/5DmbZPXB42Gn5yeX4IYgfkuM7i:vNyU2opu90XCKfdu
Malware Config
Extracted
bitrat
1.38
212.83.173.68:2576
-
communication_password
d0970714757783e6cf17b26fb8e2298f
-
tor_process
tor
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4048-137-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4048-138-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4048-139-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4048-140-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4048-141-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4048-144-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Xukbtoin = "\"C:\\Users\\Admin\\AppData\\Roaming\\Kqykcj\\Xukbtoin.exe\"" BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exepid process 4048 BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe 4048 BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe 4048 BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe 4048 BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe 4048 BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exedescription pid process target process PID 4684 set thread context of 4048 4684 BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exepid process 4684 BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe 4684 BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe 4684 BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe 4684 BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exeBB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exedescription pid process Token: SeDebugPrivilege 4684 BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe Token: SeShutdownPrivilege 4048 BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exepid process 4048 BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe 4048 BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exedescription pid process target process PID 4684 wrote to memory of 4968 4684 BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe PID 4684 wrote to memory of 4968 4684 BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe PID 4684 wrote to memory of 4968 4684 BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe PID 4684 wrote to memory of 4904 4684 BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe PID 4684 wrote to memory of 4904 4684 BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe PID 4684 wrote to memory of 4904 4684 BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe PID 4684 wrote to memory of 4048 4684 BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe PID 4684 wrote to memory of 4048 4684 BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe PID 4684 wrote to memory of 4048 4684 BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe PID 4684 wrote to memory of 4048 4684 BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe PID 4684 wrote to memory of 4048 4684 BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe PID 4684 wrote to memory of 4048 4684 BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe PID 4684 wrote to memory of 4048 4684 BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe"C:\Users\Admin\AppData\Local\Temp\BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exeC:\Users\Admin\AppData\Local\Temp\BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe2⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exeC:\Users\Admin\AppData\Local\Temp\BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe2⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exeC:\Users\Admin\AppData\Local\Temp\BB6D55AAB2282E95E85AFA000473A6DF2F1A4B4C46F17.exe2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4048