Analysis
-
max time kernel
595s -
max time network
603s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
15-12-2022 13:34
Behavioral task
behavioral1
Sample
a373d064cabacfd615563b9f094ae79e051f8f481ebaade3acb662863662f359.exe
Resource
win7-20221111-en
windows7-x64
11 signatures
600 seconds
General
-
Target
a373d064cabacfd615563b9f094ae79e051f8f481ebaade3acb662863662f359.exe
-
Size
3.8MB
-
MD5
77a3f13034cd5f7cbaf5ec1dd930d97b
-
SHA1
5b6bf670f93411031b05d8bb6870bbd3eaae52a9
-
SHA256
a373d064cabacfd615563b9f094ae79e051f8f481ebaade3acb662863662f359
-
SHA512
ffdd0ae1bba55a42e7137b03b92d66e25495f579343b9b29ab3348c6acc3d2aca93bbd254161054350f185f0fcc1c219c04ed79ad431a580f78702305e7ab3d7
-
SSDEEP
98304:d77Pmq33rE/JDLPWZADUGer7B6iY74M/ZmlwXVZ4FB:5+R/eZADUXR
Malware Config
Extracted
Family
bitrat
Version
1.38
C2
policy-generating.at.ply.gg:48719
Attributes
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
tor_process
tor
Signatures
-
Drops file in System32 directory 6 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{1E1566A8-B98B-49A8-B24A-75C06118538E}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{D34D6774-8C8B-4EC2-87BE-C6AEDCD68CE7}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallAgent\Checkpoints\9NXQXXLFST89.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallAgent\Checkpoints\9NXQXXLFST89.dat svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallAgent\Checkpoints\9NCBCSZSJRSB.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallAgent\Checkpoints\9NCBCSZSJRSB.dat svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
a373d064cabacfd615563b9f094ae79e051f8f481ebaade3acb662863662f359.exepid process 2604 a373d064cabacfd615563b9f094ae79e051f8f481ebaade3acb662863662f359.exe 2604 a373d064cabacfd615563b9f094ae79e051f8f481ebaade3acb662863662f359.exe 2604 a373d064cabacfd615563b9f094ae79e051f8f481ebaade3acb662863662f359.exe 2604 a373d064cabacfd615563b9f094ae79e051f8f481ebaade3acb662863662f359.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a373d064cabacfd615563b9f094ae79e051f8f481ebaade3acb662863662f359.exedescription pid process Token: SeShutdownPrivilege 2604 a373d064cabacfd615563b9f094ae79e051f8f481ebaade3acb662863662f359.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
a373d064cabacfd615563b9f094ae79e051f8f481ebaade3acb662863662f359.exepid process 2604 a373d064cabacfd615563b9f094ae79e051f8f481ebaade3acb662863662f359.exe 2604 a373d064cabacfd615563b9f094ae79e051f8f481ebaade3acb662863662f359.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a373d064cabacfd615563b9f094ae79e051f8f481ebaade3acb662863662f359.exe"C:\Users\Admin\AppData\Local\Temp\a373d064cabacfd615563b9f094ae79e051f8f481ebaade3acb662863662f359.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2604
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
PID:2648