Analysis
-
max time kernel
180s -
max time network
202s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 17:49
Behavioral task
behavioral1
Sample
391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe
Resource
win10v2004-20220812-en
General
-
Target
391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe
-
Size
5.9MB
-
MD5
4b8fd05f24e7dd6a8c77decf26006818
-
SHA1
756afe0c25d5bed2e17ab459fa86f6d78ed01cc2
-
SHA256
391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab
-
SHA512
45c544268e98cdcaa576617e7e6d39132b2836564c43721478b0b79708057b98fa3c67c5c2c95f19eafd12e14c9cba1b4d50442120e27fb7a1f63e2029357c4f
-
SSDEEP
98304:eVjLh6fL15rloC3QUTb3oaurBOxaY6qZNeyRb+VXukHnq6HOTUkAtnvOkNj++:7DX3QUv7uYIY6qpRbQHH9APAJOqj++
Malware Config
Extracted
bitrat
1.32
178.159.39.203:5552
-
communication_password
e48e13207341b6bffb7fb1622282247b
-
install_dir
driversmgr
-
install_file
servicemgrdriver.exe
-
tor_process
tor
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1140-54-0x0000000000400000-0x0000000000FD5000-memory.dmp vmprotect behavioral1/memory/1140-57-0x0000000000400000-0x0000000000FD5000-memory.dmp vmprotect behavioral1/memory/1140-58-0x0000000000400000-0x0000000000FD5000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\servicemgrdriver = "C:\\Users\\Admin\\AppData\\Local\\driversmgr\\servicemgrdriver.exe" 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exepid process 1140 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 1140 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 1140 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 1140 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exepid process 1140 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe -
Suspicious behavior: RenamesItself 22 IoCs
Processes:
391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exepid process 1140 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 1140 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 1140 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 1140 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 1140 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 1140 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 1140 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 1140 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 1140 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 1140 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 1140 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 1140 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 1140 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 1140 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 1140 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 1140 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 1140 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 1140 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 1140 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 1140 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 1140 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 1140 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exedescription pid process Token: SeDebugPrivilege 1140 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe Token: SeShutdownPrivilege 1140 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exepid process 1140 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 1140 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe"C:\Users\Admin\AppData\Local\Temp\391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1140