Analysis
-
max time kernel
149s -
max time network
169s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-01-2023 19:45
Static task
static1
Behavioral task
behavioral1
Sample
988287abfc76c6595d2b4979761a7e07af6505358e27716b7b8407bac66e138f.exe
Resource
win7-20221111-en
windows7-x64
6 signatures
150 seconds
General
-
Target
988287abfc76c6595d2b4979761a7e07af6505358e27716b7b8407bac66e138f.exe
-
Size
1.6MB
-
MD5
75399461e8ec68c73629aad69c298d2a
-
SHA1
047aa561be44bbdac119ef4bf4c947556a40e79d
-
SHA256
988287abfc76c6595d2b4979761a7e07af6505358e27716b7b8407bac66e138f
-
SHA512
75ae6562bc0598fe5d450e8c0d043cbc2fbf82358906788d8150ddc172257446cf747875cd68d0f36fdf5bd864752e44933a7a67d853762f0a017b72bc298a14
-
SSDEEP
49152:CRiWFHcEWQEG36GuyiA96mE/d1IWYDcj9a/HQLr7ch+:tWmKEsbw17Y6mHJh
Malware Config
Extracted
Family
bitrat
Version
1.34
C2
185.58.92.227:5354
Attributes
-
communication_password
cbac3bfef1a0cdb02fa8e2b300c7da3f
-
tor_process
tor
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
svchost.exepid process 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
988287abfc76c6595d2b4979761a7e07af6505358e27716b7b8407bac66e138f.exedescription pid process target process PID 1224 set thread context of 1396 1224 988287abfc76c6595d2b4979761a7e07af6505358e27716b7b8407bac66e138f.exe svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
svchost.exedescription pid process Token: SeDebugPrivilege 1396 svchost.exe Token: SeShutdownPrivilege 1396 svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
svchost.exepid process 1396 svchost.exe 1396 svchost.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
988287abfc76c6595d2b4979761a7e07af6505358e27716b7b8407bac66e138f.exedescription pid process target process PID 1224 wrote to memory of 1396 1224 988287abfc76c6595d2b4979761a7e07af6505358e27716b7b8407bac66e138f.exe svchost.exe PID 1224 wrote to memory of 1396 1224 988287abfc76c6595d2b4979761a7e07af6505358e27716b7b8407bac66e138f.exe svchost.exe PID 1224 wrote to memory of 1396 1224 988287abfc76c6595d2b4979761a7e07af6505358e27716b7b8407bac66e138f.exe svchost.exe PID 1224 wrote to memory of 1396 1224 988287abfc76c6595d2b4979761a7e07af6505358e27716b7b8407bac66e138f.exe svchost.exe PID 1224 wrote to memory of 1396 1224 988287abfc76c6595d2b4979761a7e07af6505358e27716b7b8407bac66e138f.exe svchost.exe PID 1224 wrote to memory of 1396 1224 988287abfc76c6595d2b4979761a7e07af6505358e27716b7b8407bac66e138f.exe svchost.exe PID 1224 wrote to memory of 1396 1224 988287abfc76c6595d2b4979761a7e07af6505358e27716b7b8407bac66e138f.exe svchost.exe PID 1224 wrote to memory of 1396 1224 988287abfc76c6595d2b4979761a7e07af6505358e27716b7b8407bac66e138f.exe svchost.exe PID 1224 wrote to memory of 1396 1224 988287abfc76c6595d2b4979761a7e07af6505358e27716b7b8407bac66e138f.exe svchost.exe PID 1224 wrote to memory of 1396 1224 988287abfc76c6595d2b4979761a7e07af6505358e27716b7b8407bac66e138f.exe svchost.exe PID 1224 wrote to memory of 1396 1224 988287abfc76c6595d2b4979761a7e07af6505358e27716b7b8407bac66e138f.exe svchost.exe PID 1224 wrote to memory of 1396 1224 988287abfc76c6595d2b4979761a7e07af6505358e27716b7b8407bac66e138f.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\988287abfc76c6595d2b4979761a7e07af6505358e27716b7b8407bac66e138f.exe"C:\Users\Admin\AppData\Local\Temp\988287abfc76c6595d2b4979761a7e07af6505358e27716b7b8407bac66e138f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWow64\svchost.exe"C:\\Windows\\SysWow64\\svchost.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1396