Analysis
-
max time kernel
92s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2022 09:47
Static task
static1
Behavioral task
behavioral1
Sample
bf00a990eb93a4696f6b5d6029d654ce3e2959b14db849c6630c17256c7aa31b.exe
Resource
win7-20220901-en
General
-
Target
bf00a990eb93a4696f6b5d6029d654ce3e2959b14db849c6630c17256c7aa31b.exe
-
Size
871KB
-
MD5
8dcec334c74becd217f0f61c53a45a54
-
SHA1
02a178c1bdd24a780c491c2efe1dcf6bb6be13f7
-
SHA256
bf00a990eb93a4696f6b5d6029d654ce3e2959b14db849c6630c17256c7aa31b
-
SHA512
bf8b6f0043aa222be36c4c6816a95a62a8cc17bbee4454d110d590e2bde7e3ca60504cae01196cf6a2a31f92dd874517fde082dfa505a394b2bf2bbda3a76695
-
SSDEEP
12288:q39riVwf3iJ+HN3TF4W7Wba0WGU68RnAgqgNYEgeGEKDBjs2sd0psmCA+Pdm7Y7a:qNriy/fTFOzgCGTjUDn/MI9d
Malware Config
Extracted
allcome
http://dba692117be7b6d3480fe5220fdd58b38bf.xyz/API/2/configure.php?cf6zrlhn=finarnw
D5c27bWU8dvgdayPUMzKbc75CmsD9aUSDw
r4RkKWPKszhkZVTtXGBDNyrzcDPjpcnGNp
0xC4b495c6ef4B61d5757a1e78dE22edC315867C84
XshLZA5C9odmaiEfopX5DYvwMbnM4hqCME
TT7mceJ6BNhTPFqpaBy1ND1CWGwaGeqhpx
t1MrxfTEGEZioK7qjcDd48KVC5BMk7ccH8B
GCM62OODIUXHYPTVUZT2W4GKPIO7YMLZDNPR4NGUWLBU7KPOU7Q7E44X
48Zvk6W9kfXik8CEscQYjEZdDCVZtXNEGdjczTR4XD9SKfLWkirntGLR7UyhD7aas3C2N3QefcdB4gyLZt93CrmtP5WAeqJ
qz448vxrv9y6lsy0l4y6x98gylykleumxqnqs7fkn6
1AvqxpSfuNooDv2gn8rFNXiWP64bn7m8xa
0x7374d06666974119Fb6C8c1F10D4Ab7eCB724Fcd
LKcXMo6X6jGyk9o9phn4YvYUQ8QVR4wJgo
ronin:bb375c985bc63d448b3bc14cda06b2866f75e342
+79889916188
+79889916188
+79889916188
MJfnNkoXewo8QB5iu9dee2exwdavDxWRLC
ltc1q309prv3k8lc9gqd062eevjvxmkgyv00xe3m6jg
3Gs18Dq8SNrs3kLQdrpUFHa2yX8uD9ZXR7
bc1qhcynpwvj6lvdh393ph8tesk0mljsc6z3y40h2m
89PjhdrngYjeSa8dFeg6q8Sz4BXdrLLP8H8z82eUhTNjPBpTYkr3o6fWnkqng9D5TRaPT4HafXwUTJqcPE8SsbHUK5PM2Qx
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4848 set thread context of 1040 4848 bf00a990eb93a4696f6b5d6029d654ce3e2959b14db849c6630c17256c7aa31b.exe 90 -
Program crash 2 IoCs
pid pid_target Process procid_target 2512 1040 WerFault.exe 90 3340 1040 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4848 bf00a990eb93a4696f6b5d6029d654ce3e2959b14db849c6630c17256c7aa31b.exe 4848 bf00a990eb93a4696f6b5d6029d654ce3e2959b14db849c6630c17256c7aa31b.exe 4848 bf00a990eb93a4696f6b5d6029d654ce3e2959b14db849c6630c17256c7aa31b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4848 bf00a990eb93a4696f6b5d6029d654ce3e2959b14db849c6630c17256c7aa31b.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4848 wrote to memory of 1040 4848 bf00a990eb93a4696f6b5d6029d654ce3e2959b14db849c6630c17256c7aa31b.exe 90 PID 4848 wrote to memory of 1040 4848 bf00a990eb93a4696f6b5d6029d654ce3e2959b14db849c6630c17256c7aa31b.exe 90 PID 4848 wrote to memory of 1040 4848 bf00a990eb93a4696f6b5d6029d654ce3e2959b14db849c6630c17256c7aa31b.exe 90 PID 4848 wrote to memory of 1040 4848 bf00a990eb93a4696f6b5d6029d654ce3e2959b14db849c6630c17256c7aa31b.exe 90 PID 4848 wrote to memory of 1040 4848 bf00a990eb93a4696f6b5d6029d654ce3e2959b14db849c6630c17256c7aa31b.exe 90 PID 4848 wrote to memory of 1040 4848 bf00a990eb93a4696f6b5d6029d654ce3e2959b14db849c6630c17256c7aa31b.exe 90 PID 4848 wrote to memory of 1040 4848 bf00a990eb93a4696f6b5d6029d654ce3e2959b14db849c6630c17256c7aa31b.exe 90 PID 4848 wrote to memory of 1040 4848 bf00a990eb93a4696f6b5d6029d654ce3e2959b14db849c6630c17256c7aa31b.exe 90 PID 4848 wrote to memory of 1040 4848 bf00a990eb93a4696f6b5d6029d654ce3e2959b14db849c6630c17256c7aa31b.exe 90 PID 4848 wrote to memory of 1040 4848 bf00a990eb93a4696f6b5d6029d654ce3e2959b14db849c6630c17256c7aa31b.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf00a990eb93a4696f6b5d6029d654ce3e2959b14db849c6630c17256c7aa31b.exe"C:\Users\Admin\AppData\Local\Temp\bf00a990eb93a4696f6b5d6029d654ce3e2959b14db849c6630c17256c7aa31b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\bf00a990eb93a4696f6b5d6029d654ce3e2959b14db849c6630c17256c7aa31b.exe"C:\Users\Admin\AppData\Local\Temp\bf00a990eb93a4696f6b5d6029d654ce3e2959b14db849c6630c17256c7aa31b.exe"2⤵PID:1040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1040 -s 4523⤵
- Program crash
PID:2512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1040 -s 4563⤵
- Program crash
PID:3340
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1040 -ip 10401⤵PID:2296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1040 -ip 10401⤵PID:1336