Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 16:45
Behavioral task
behavioral1
Sample
d3a5eb35753888cbf3d6f12f2fbb938a7b53be9a47b1b9b4db15170692f18459.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d3a5eb35753888cbf3d6f12f2fbb938a7b53be9a47b1b9b4db15170692f18459.exe
Resource
win10v2004-20220901-en
General
-
Target
d3a5eb35753888cbf3d6f12f2fbb938a7b53be9a47b1b9b4db15170692f18459.exe
-
Size
71KB
-
MD5
0a554676ea50a2c9ed1f45998f00c386
-
SHA1
1cdc0ed2c93040df08c64c002dc32034d82c746f
-
SHA256
d3a5eb35753888cbf3d6f12f2fbb938a7b53be9a47b1b9b4db15170692f18459
-
SHA512
fd7b081ac8c4cc6830b75a4c9fdfe2445894e2a09daaabea38184323fa7890aa24293d106d24651e1a0105904c2bb920585ff2750dc3358d0a8c04ffb20b8f4e
-
SSDEEP
1536:dDHZHYqvKqJdYxXimwLZXZtn5KLZyTDGm/Xcg:ZBlYxPqZX5K0HGm/cg
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
d3a5eb35753888cbf3d6f12f2fbb938a7b53be9a47b1b9b4db15170692f18459.exedescription pid process target process PID 1204 set thread context of 1240 1204 d3a5eb35753888cbf3d6f12f2fbb938a7b53be9a47b1b9b4db15170692f18459.exe d3a5eb35753888cbf3d6f12f2fbb938a7b53be9a47b1b9b4db15170692f18459.exe -
Drops file in Program Files directory 4 IoCs
Processes:
d3a5eb35753888cbf3d6f12f2fbb938a7b53be9a47b1b9b4db15170692f18459.exedescription ioc process File opened for modification C:\Program Files (x86)\Bifrost\server.exe d3a5eb35753888cbf3d6f12f2fbb938a7b53be9a47b1b9b4db15170692f18459.exe File created C:\Program Files (x86)\Bifrost\server.exe d3a5eb35753888cbf3d6f12f2fbb938a7b53be9a47b1b9b4db15170692f18459.exe File opened for modification C:\Program Files (x86)\Bifrost\klog.dat d3a5eb35753888cbf3d6f12f2fbb938a7b53be9a47b1b9b4db15170692f18459.exe File opened for modification C:\Program Files (x86)\Bifrost d3a5eb35753888cbf3d6f12f2fbb938a7b53be9a47b1b9b4db15170692f18459.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
d3a5eb35753888cbf3d6f12f2fbb938a7b53be9a47b1b9b4db15170692f18459.exedescription pid process Token: SeDebugPrivilege 1240 d3a5eb35753888cbf3d6f12f2fbb938a7b53be9a47b1b9b4db15170692f18459.exe Token: SeDebugPrivilege 1240 d3a5eb35753888cbf3d6f12f2fbb938a7b53be9a47b1b9b4db15170692f18459.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
d3a5eb35753888cbf3d6f12f2fbb938a7b53be9a47b1b9b4db15170692f18459.exepid process 1240 d3a5eb35753888cbf3d6f12f2fbb938a7b53be9a47b1b9b4db15170692f18459.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
d3a5eb35753888cbf3d6f12f2fbb938a7b53be9a47b1b9b4db15170692f18459.exedescription pid process target process PID 1204 wrote to memory of 1240 1204 d3a5eb35753888cbf3d6f12f2fbb938a7b53be9a47b1b9b4db15170692f18459.exe d3a5eb35753888cbf3d6f12f2fbb938a7b53be9a47b1b9b4db15170692f18459.exe PID 1204 wrote to memory of 1240 1204 d3a5eb35753888cbf3d6f12f2fbb938a7b53be9a47b1b9b4db15170692f18459.exe d3a5eb35753888cbf3d6f12f2fbb938a7b53be9a47b1b9b4db15170692f18459.exe PID 1204 wrote to memory of 1240 1204 d3a5eb35753888cbf3d6f12f2fbb938a7b53be9a47b1b9b4db15170692f18459.exe d3a5eb35753888cbf3d6f12f2fbb938a7b53be9a47b1b9b4db15170692f18459.exe PID 1204 wrote to memory of 1240 1204 d3a5eb35753888cbf3d6f12f2fbb938a7b53be9a47b1b9b4db15170692f18459.exe d3a5eb35753888cbf3d6f12f2fbb938a7b53be9a47b1b9b4db15170692f18459.exe PID 1204 wrote to memory of 1240 1204 d3a5eb35753888cbf3d6f12f2fbb938a7b53be9a47b1b9b4db15170692f18459.exe d3a5eb35753888cbf3d6f12f2fbb938a7b53be9a47b1b9b4db15170692f18459.exe PID 1204 wrote to memory of 1240 1204 d3a5eb35753888cbf3d6f12f2fbb938a7b53be9a47b1b9b4db15170692f18459.exe d3a5eb35753888cbf3d6f12f2fbb938a7b53be9a47b1b9b4db15170692f18459.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3a5eb35753888cbf3d6f12f2fbb938a7b53be9a47b1b9b4db15170692f18459.exe"C:\Users\Admin\AppData\Local\Temp\d3a5eb35753888cbf3d6f12f2fbb938a7b53be9a47b1b9b4db15170692f18459.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\d3a5eb35753888cbf3d6f12f2fbb938a7b53be9a47b1b9b4db15170692f18459.exeC:\Users\Admin\AppData\Local\Temp\d3a5eb35753888cbf3d6f12f2fbb938a7b53be9a47b1b9b4db15170692f18459.exe2⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1240
-