Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
19-01-2023 09:26
Behavioral task
behavioral1
Sample
fd3822ff0c074b2d8f02973669525f3d.exe
Resource
win7-20221111-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
fd3822ff0c074b2d8f02973669525f3d.exe
Resource
win10v2004-20220812-en
6 signatures
150 seconds
General
-
Target
fd3822ff0c074b2d8f02973669525f3d.exe
-
Size
3.8MB
-
MD5
fd3822ff0c074b2d8f02973669525f3d
-
SHA1
bf5620d5a11165575a48adea5ab6ef852bad5f33
-
SHA256
7ed25ec70f54b43a85d83652b07b14d297530aa83d53eb777df0f20117bf612d
-
SHA512
a6cd8a62217bc3ad7858703cef816e4bfbb3c85af061b00998a91aef4a37765e408f693698eb38936897b3c6b310442e3a8c8c026490dd7355c9cfb49c7b537d
-
SSDEEP
98304:d77Pmq33rE/JDLPWZADUGer7B6iY74M/gmlwXVZ4FB:5+R/eZADUXR
Score
10/10
Malware Config
Extracted
Family
bitrat
Version
1.38
C2
executivemoney.ddns.net:897
Attributes
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
install_dir
chuka
-
install_file
chromwin.exe
-
tor_process
tor
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\chromwin = "C:\\Users\\Admin\\AppData\\Local\\chuka\\chromwin.exe" fd3822ff0c074b2d8f02973669525f3d.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 840 fd3822ff0c074b2d8f02973669525f3d.exe 840 fd3822ff0c074b2d8f02973669525f3d.exe 840 fd3822ff0c074b2d8f02973669525f3d.exe 840 fd3822ff0c074b2d8f02973669525f3d.exe 840 fd3822ff0c074b2d8f02973669525f3d.exe -
Suspicious behavior: RenamesItself 27 IoCs
pid Process 840 fd3822ff0c074b2d8f02973669525f3d.exe 840 fd3822ff0c074b2d8f02973669525f3d.exe 840 fd3822ff0c074b2d8f02973669525f3d.exe 840 fd3822ff0c074b2d8f02973669525f3d.exe 840 fd3822ff0c074b2d8f02973669525f3d.exe 840 fd3822ff0c074b2d8f02973669525f3d.exe 840 fd3822ff0c074b2d8f02973669525f3d.exe 840 fd3822ff0c074b2d8f02973669525f3d.exe 840 fd3822ff0c074b2d8f02973669525f3d.exe 840 fd3822ff0c074b2d8f02973669525f3d.exe 840 fd3822ff0c074b2d8f02973669525f3d.exe 840 fd3822ff0c074b2d8f02973669525f3d.exe 840 fd3822ff0c074b2d8f02973669525f3d.exe 840 fd3822ff0c074b2d8f02973669525f3d.exe 840 fd3822ff0c074b2d8f02973669525f3d.exe 840 fd3822ff0c074b2d8f02973669525f3d.exe 840 fd3822ff0c074b2d8f02973669525f3d.exe 840 fd3822ff0c074b2d8f02973669525f3d.exe 840 fd3822ff0c074b2d8f02973669525f3d.exe 840 fd3822ff0c074b2d8f02973669525f3d.exe 840 fd3822ff0c074b2d8f02973669525f3d.exe 840 fd3822ff0c074b2d8f02973669525f3d.exe 840 fd3822ff0c074b2d8f02973669525f3d.exe 840 fd3822ff0c074b2d8f02973669525f3d.exe 840 fd3822ff0c074b2d8f02973669525f3d.exe 840 fd3822ff0c074b2d8f02973669525f3d.exe 840 fd3822ff0c074b2d8f02973669525f3d.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 840 fd3822ff0c074b2d8f02973669525f3d.exe Token: SeShutdownPrivilege 840 fd3822ff0c074b2d8f02973669525f3d.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 840 fd3822ff0c074b2d8f02973669525f3d.exe 840 fd3822ff0c074b2d8f02973669525f3d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd3822ff0c074b2d8f02973669525f3d.exe"C:\Users\Admin\AppData\Local\Temp\fd3822ff0c074b2d8f02973669525f3d.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:840