Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
03-07-2023 01:38
Static task
static1
Behavioral task
behavioral1
Sample
5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe
Resource
win10v2004-20230621-en
General
-
Target
5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe
-
Size
4.9MB
-
MD5
a47434b53be19aa80e4529da0ac4e528
-
SHA1
e2535e69d067f6557f2c83bd05dc47289c61b0d8
-
SHA256
5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b
-
SHA512
f0251d15e29042d432c141f6df43ff267cd3c912a48afe6f83ed1d5588078191eb98763608f2d89b92cb33ec54db16d42bba03a83c329b4cab84615059f28d65
-
SSDEEP
98304:lfROAm0ADHsXLIsFmL5vTWJdVzealPxaLnU4UUU3UUU:lfROAm0ADHsXLIBvMtUU4UUU3UUU
Malware Config
Extracted
bitrat
1.38
104.223.91.190:1234
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
install_dir
Install path
-
install_file
Install name
-
tor_process
tor
Signatures
-
Drops startup file 1 IoCs
Processes:
5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Babryua.vbs 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4129409437-3162877118-52503038-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Install name = "C:\\Users\\Admin\\AppData\\Local\\Install path\\Install name" 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exepid process 5032 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe 5032 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe 5032 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe 5032 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe 5032 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exedescription pid process target process PID 812 set thread context of 5032 812 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exepid process 812 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe -
Suspicious behavior: RenamesItself 2 IoCs
Processes:
5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exepid process 5032 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe 5032 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exedescription pid process Token: SeDebugPrivilege 812 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe Token: SeShutdownPrivilege 5032 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exepid process 5032 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe 5032 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exedescription pid process target process PID 812 wrote to memory of 5032 812 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe PID 812 wrote to memory of 5032 812 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe PID 812 wrote to memory of 5032 812 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe PID 812 wrote to memory of 5032 812 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe PID 812 wrote to memory of 5032 812 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe PID 812 wrote to memory of 5032 812 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe PID 812 wrote to memory of 5032 812 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe PID 812 wrote to memory of 5032 812 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe PID 812 wrote to memory of 5032 812 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe PID 812 wrote to memory of 5032 812 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe PID 812 wrote to memory of 5032 812 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe 5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe"C:\Users\Admin\AppData\Local\Temp\5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Users\Admin\AppData\Local\Temp\5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exeC:\Users\Admin\AppData\Local\Temp\5726631bd5354455869b80013d408d97b6d479d61697aecfa253fb42caed3b1b.exe purecrypter.exe2⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5032