Analysis
-
max time kernel
153s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
21-03-2023 14:32
Static task
static1
Behavioral task
behavioral1
Sample
bc0374c212e401d5f220df5657a980fc40fc210af0a7c34dd8d43556d8b2a4be.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bc0374c212e401d5f220df5657a980fc40fc210af0a7c34dd8d43556d8b2a4be.exe
Resource
win10v2004-20230221-en
General
-
Target
bc0374c212e401d5f220df5657a980fc40fc210af0a7c34dd8d43556d8b2a4be.exe
-
Size
2.1MB
-
MD5
bf35c2910d407f1cf330f465a793dc1b
-
SHA1
306324e8b2cc82f09c7b0f56cde008337b8f5205
-
SHA256
bc0374c212e401d5f220df5657a980fc40fc210af0a7c34dd8d43556d8b2a4be
-
SHA512
6fb5fa5ab36acbcf9726426b31ec843b3f8d277047e8d1d51136a91628dd3e0d2c99e6809578ab83f0cc5bb67706462b5653ce00943c7b168d010ce7faab9094
-
SSDEEP
49152:UrpxN1w5b1QvE4mnVA93py1abMy+mUIuEMyN5KvG8aM6TyHIzkY:Ijw5K4A93paabwtIuEMyN2G8fRY
Malware Config
Extracted
bitrat
1.38
pradeepprabhu705.hopto.org:312
-
communication_password
827ccb0eea8a706c4c34a16891f84e7b
-
tor_process
tor
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
bc0374c212e401d5f220df5657a980fc40fc210af0a7c34dd8d43556d8b2a4be.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "\"C:\\Users\\Admin\\AppData\\Roaming\\BmUXYeTbHs5V2xGl\\s7IjvR3OhJT5.exe\",explorer.exe" bc0374c212e401d5f220df5657a980fc40fc210af0a7c34dd8d43556d8b2a4be.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
bc0374c212e401d5f220df5657a980fc40fc210af0a7c34dd8d43556d8b2a4be.exepid process 1312 bc0374c212e401d5f220df5657a980fc40fc210af0a7c34dd8d43556d8b2a4be.exe 1312 bc0374c212e401d5f220df5657a980fc40fc210af0a7c34dd8d43556d8b2a4be.exe 1312 bc0374c212e401d5f220df5657a980fc40fc210af0a7c34dd8d43556d8b2a4be.exe 1312 bc0374c212e401d5f220df5657a980fc40fc210af0a7c34dd8d43556d8b2a4be.exe 1312 bc0374c212e401d5f220df5657a980fc40fc210af0a7c34dd8d43556d8b2a4be.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
bc0374c212e401d5f220df5657a980fc40fc210af0a7c34dd8d43556d8b2a4be.exedescription pid process Token: SeDebugPrivilege 1312 bc0374c212e401d5f220df5657a980fc40fc210af0a7c34dd8d43556d8b2a4be.exe Token: SeDebugPrivilege 1312 bc0374c212e401d5f220df5657a980fc40fc210af0a7c34dd8d43556d8b2a4be.exe Token: SeShutdownPrivilege 1312 bc0374c212e401d5f220df5657a980fc40fc210af0a7c34dd8d43556d8b2a4be.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
bc0374c212e401d5f220df5657a980fc40fc210af0a7c34dd8d43556d8b2a4be.exepid process 1312 bc0374c212e401d5f220df5657a980fc40fc210af0a7c34dd8d43556d8b2a4be.exe 1312 bc0374c212e401d5f220df5657a980fc40fc210af0a7c34dd8d43556d8b2a4be.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc0374c212e401d5f220df5657a980fc40fc210af0a7c34dd8d43556d8b2a4be.exe"C:\Users\Admin\AppData\Local\Temp\bc0374c212e401d5f220df5657a980fc40fc210af0a7c34dd8d43556d8b2a4be.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1312