Analysis
-
max time kernel
148s -
max time network
168s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-01-2023 18:57
Static task
static1
Behavioral task
behavioral1
Sample
b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exe
Resource
win10v2004-20220812-en
General
-
Target
b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exe
-
Size
3.9MB
-
MD5
3930ae2afd78cebd07ee522014f942bc
-
SHA1
c074738840116989c397e776f6765a7d2b05090c
-
SHA256
b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c
-
SHA512
df24b7edfd9d402f906f30eba48a3b8f4adfc3441ac4132faaca5cace1103e4e3ebc59d0f3eac9fb4908d94773e9b982dcee733079be2ec8865b40fe3b5ac2c3
-
SSDEEP
98304:glSQqo5yaawMonJBQ0vaQpcj9qAauBaj/S3+39Uox68a7x:aqKysMoJC+Hajacaj/SIx6l7x
Malware Config
Extracted
bitrat
1.34
37.46.150.134:8899
-
communication_password
19725ba371ae91990ff07d0f95218af7
-
install_dir
{WinAPIN}
-
install_file
WinAPINHelper.exe
-
tor_process
tor
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinAPINHelper = "C:\\Users\\Admin\\AppData\\Local\\{WinAPIN}\\WinAPINHelper.exe" b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exepid process 1756 b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exe 1756 b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exe 1756 b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exe 1756 b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exedescription pid process target process PID 1352 set thread context of 1756 1352 b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exe b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exepid process 1352 b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exepid process 1756 b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exedescription pid process Token: SeDebugPrivilege 1756 b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exe Token: SeShutdownPrivilege 1756 b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exeb8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exepid process 1352 b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exe 1756 b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exe 1756 b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exedescription pid process target process PID 1352 wrote to memory of 1756 1352 b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exe b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exe PID 1352 wrote to memory of 1756 1352 b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exe b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exe PID 1352 wrote to memory of 1756 1352 b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exe b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exe PID 1352 wrote to memory of 1756 1352 b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exe b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exe PID 1352 wrote to memory of 1756 1352 b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exe b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exe"C:\Users\Admin\AppData\Local\Temp\b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exe"C:\Users\Admin\AppData\Local\Temp\b8e41e942aa1da72e79abe17a2b53bd711302372c53d598b5acf7bb507c5db2c.exe"2⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1756