Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2022 17:49
Behavioral task
behavioral1
Sample
391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe
Resource
win10v2004-20220812-en
General
-
Target
391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe
-
Size
5.9MB
-
MD5
4b8fd05f24e7dd6a8c77decf26006818
-
SHA1
756afe0c25d5bed2e17ab459fa86f6d78ed01cc2
-
SHA256
391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab
-
SHA512
45c544268e98cdcaa576617e7e6d39132b2836564c43721478b0b79708057b98fa3c67c5c2c95f19eafd12e14c9cba1b4d50442120e27fb7a1f63e2029357c4f
-
SSDEEP
98304:eVjLh6fL15rloC3QUTb3oaurBOxaY6qZNeyRb+VXukHnq6HOTUkAtnvOkNj++:7DX3QUv7uYIY6qpRbQHH9APAJOqj++
Malware Config
Extracted
bitrat
1.32
178.159.39.203:5552
-
communication_password
e48e13207341b6bffb7fb1622282247b
-
install_dir
driversmgr
-
install_file
servicemgrdriver.exe
-
tor_process
tor
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4976-132-0x0000000000400000-0x0000000000FD5000-memory.dmp vmprotect behavioral2/memory/4976-133-0x0000000000400000-0x0000000000FD5000-memory.dmp vmprotect behavioral2/memory/4976-136-0x0000000000400000-0x0000000000FD5000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\servicemgrdriver = "C:\\Users\\Admin\\AppData\\Local\\driversmgr\\servicemgrdriver.exe" 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exepid process 4976 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 4976 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 4976 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 4976 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exepid process 4976 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 4976 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe -
Suspicious behavior: RenamesItself 23 IoCs
Processes:
391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exepid process 4976 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 4976 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 4976 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 4976 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 4976 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 4976 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 4976 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 4976 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 4976 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 4976 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 4976 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 4976 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 4976 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 4976 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 4976 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 4976 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 4976 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 4976 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 4976 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 4976 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 4976 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 4976 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 4976 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exedescription pid process Token: SeShutdownPrivilege 4976 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exepid process 4976 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe 4976 391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe"C:\Users\Admin\AppData\Local\Temp\391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4976