Analysis
-
max time kernel
150s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2023 19:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a47434b53be19aa80e4529da0ac4e528.exe
Resource
win7-20230621-en
windows7-x64
2 signatures
150 seconds
General
-
Target
a47434b53be19aa80e4529da0ac4e528.exe
-
Size
4.9MB
-
MD5
a47434b53be19aa80e4529da0ac4e528
-
SHA1
e2535e69d067f6557f2c83bd05dc47289c61b0d8
-
SHA256
5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b
-
SHA512
f0251d15e29042d432c141f6df43ff267cd3c912a48afe6f83ed1d5588078191eb98763608f2d89b92cb33ec54db16d42bba03a83c329b4cab84615059f28d65
-
SSDEEP
98304:lfROAm0ADHsXLIsFmL5vTWJdVzealPxaLnU4UUU3UUU:lfROAm0ADHsXLIBvMtUU4UUU3UUU
Malware Config
Extracted
Family
bitrat
Version
1.38
C2
104.223.91.190:1234
Attributes
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
install_dir
Install path
-
install_file
Install name
-
tor_process
tor
Signatures
-
Drops startup file 1 IoCs
Processes:
a47434b53be19aa80e4529da0ac4e528.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Babryua.vbs a47434b53be19aa80e4529da0ac4e528.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
a47434b53be19aa80e4529da0ac4e528.exepid process 4948 a47434b53be19aa80e4529da0ac4e528.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
a47434b53be19aa80e4529da0ac4e528.exedescription pid process target process PID 4960 set thread context of 4948 4960 a47434b53be19aa80e4529da0ac4e528.exe a47434b53be19aa80e4529da0ac4e528.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
a47434b53be19aa80e4529da0ac4e528.exepid process 4960 a47434b53be19aa80e4529da0ac4e528.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
a47434b53be19aa80e4529da0ac4e528.exea47434b53be19aa80e4529da0ac4e528.exedescription pid process Token: SeDebugPrivilege 4960 a47434b53be19aa80e4529da0ac4e528.exe Token: SeShutdownPrivilege 4948 a47434b53be19aa80e4529da0ac4e528.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
a47434b53be19aa80e4529da0ac4e528.exedescription pid process target process PID 4960 wrote to memory of 4948 4960 a47434b53be19aa80e4529da0ac4e528.exe a47434b53be19aa80e4529da0ac4e528.exe PID 4960 wrote to memory of 4948 4960 a47434b53be19aa80e4529da0ac4e528.exe a47434b53be19aa80e4529da0ac4e528.exe PID 4960 wrote to memory of 4948 4960 a47434b53be19aa80e4529da0ac4e528.exe a47434b53be19aa80e4529da0ac4e528.exe PID 4960 wrote to memory of 4948 4960 a47434b53be19aa80e4529da0ac4e528.exe a47434b53be19aa80e4529da0ac4e528.exe PID 4960 wrote to memory of 4948 4960 a47434b53be19aa80e4529da0ac4e528.exe a47434b53be19aa80e4529da0ac4e528.exe PID 4960 wrote to memory of 4948 4960 a47434b53be19aa80e4529da0ac4e528.exe a47434b53be19aa80e4529da0ac4e528.exe PID 4960 wrote to memory of 4948 4960 a47434b53be19aa80e4529da0ac4e528.exe a47434b53be19aa80e4529da0ac4e528.exe PID 4960 wrote to memory of 4948 4960 a47434b53be19aa80e4529da0ac4e528.exe a47434b53be19aa80e4529da0ac4e528.exe PID 4960 wrote to memory of 4948 4960 a47434b53be19aa80e4529da0ac4e528.exe a47434b53be19aa80e4529da0ac4e528.exe PID 4960 wrote to memory of 4948 4960 a47434b53be19aa80e4529da0ac4e528.exe a47434b53be19aa80e4529da0ac4e528.exe PID 4960 wrote to memory of 4948 4960 a47434b53be19aa80e4529da0ac4e528.exe a47434b53be19aa80e4529da0ac4e528.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a47434b53be19aa80e4529da0ac4e528.exe"C:\Users\Admin\AppData\Local\Temp\a47434b53be19aa80e4529da0ac4e528.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\a47434b53be19aa80e4529da0ac4e528.exeC:\Users\Admin\AppData\Local\Temp\a47434b53be19aa80e4529da0ac4e528.exe purecrypter.exe2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:4948