Analysis
-
max time kernel
150s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
19-07-2023 09:53
Static task
static1
Behavioral task
behavioral1
Sample
98e0809917278f2487861ede52d85f97.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
98e0809917278f2487861ede52d85f97.exe
Resource
win10v2004-20230703-en
General
-
Target
98e0809917278f2487861ede52d85f97.exe
-
Size
2.7MB
-
MD5
98e0809917278f2487861ede52d85f97
-
SHA1
d22abc16310091741c5f963140a545ad886fb6f3
-
SHA256
9c176196e1ea1061400ed75a74b16784aa58e87710f516eb363f296d0f909fb0
-
SHA512
e342d5fbe794f141da8b9cd8dbb0d9c4655eda9c2b21dcec9a70a75c4d400f99c03c06b54262498774fd2c9be0680dbab71b8296d1d8ab22fc67a1f20f1df99f
-
SSDEEP
49152:R6j5pEmBa2lKdWFTXIRxPMvid7P9cSnWbe2aWsuHxxIcK3S/Y7w9b:R6j5mqKdmTqmviBjnqPsuRxBdq
Malware Config
Extracted
bitrat
1.35
publiquilla.linkpc.net:9089
-
communication_password
bfdba24ee3d61f0260c4dc1034c3ee43
-
install_dir
windowssecurirysercivehealtht
-
install_file
windowssecuritrysercive.exe
-
tor_process
tor
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2204-63-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2204-64-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2204-67-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2204-68-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2204-70-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2204-72-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2204-73-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2204-74-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2204-75-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2204-77-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2204-76-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2204-78-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2204-79-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2204-80-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2204-81-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2204-82-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2204-85-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2204-83-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2204-87-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2204-88-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2204-89-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2204-90-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
98e0809917278f2487861ede52d85f97.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Windows\CurrentVersion\Run\windowssecuritrysercive = "C:\\Users\\Admin\\AppData\\Local\\windowssecurirysercivehealtht\\windowssecuritrysercive.exe" 98e0809917278f2487861ede52d85f97.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
98e0809917278f2487861ede52d85f97.exepid process 2204 98e0809917278f2487861ede52d85f97.exe 2204 98e0809917278f2487861ede52d85f97.exe 2204 98e0809917278f2487861ede52d85f97.exe 2204 98e0809917278f2487861ede52d85f97.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
98e0809917278f2487861ede52d85f97.exedescription pid process target process PID 2196 set thread context of 2204 2196 98e0809917278f2487861ede52d85f97.exe 98e0809917278f2487861ede52d85f97.exe -
NTFS ADS 1 IoCs
Processes:
98e0809917278f2487861ede52d85f97.exedescription ioc process File created C:\Users\Admin\AppData\Local:19-07-2023 98e0809917278f2487861ede52d85f97.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
98e0809917278f2487861ede52d85f97.exepid process 2196 98e0809917278f2487861ede52d85f97.exe 2196 98e0809917278f2487861ede52d85f97.exe 2196 98e0809917278f2487861ede52d85f97.exe 2196 98e0809917278f2487861ede52d85f97.exe 2196 98e0809917278f2487861ede52d85f97.exe -
Suspicious behavior: RenamesItself 19 IoCs
Processes:
98e0809917278f2487861ede52d85f97.exepid process 2204 98e0809917278f2487861ede52d85f97.exe 2204 98e0809917278f2487861ede52d85f97.exe 2204 98e0809917278f2487861ede52d85f97.exe 2204 98e0809917278f2487861ede52d85f97.exe 2204 98e0809917278f2487861ede52d85f97.exe 2204 98e0809917278f2487861ede52d85f97.exe 2204 98e0809917278f2487861ede52d85f97.exe 2204 98e0809917278f2487861ede52d85f97.exe 2204 98e0809917278f2487861ede52d85f97.exe 2204 98e0809917278f2487861ede52d85f97.exe 2204 98e0809917278f2487861ede52d85f97.exe 2204 98e0809917278f2487861ede52d85f97.exe 2204 98e0809917278f2487861ede52d85f97.exe 2204 98e0809917278f2487861ede52d85f97.exe 2204 98e0809917278f2487861ede52d85f97.exe 2204 98e0809917278f2487861ede52d85f97.exe 2204 98e0809917278f2487861ede52d85f97.exe 2204 98e0809917278f2487861ede52d85f97.exe 2204 98e0809917278f2487861ede52d85f97.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
98e0809917278f2487861ede52d85f97.exe98e0809917278f2487861ede52d85f97.exedescription pid process Token: SeDebugPrivilege 2196 98e0809917278f2487861ede52d85f97.exe Token: SeDebugPrivilege 2204 98e0809917278f2487861ede52d85f97.exe Token: SeShutdownPrivilege 2204 98e0809917278f2487861ede52d85f97.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
98e0809917278f2487861ede52d85f97.exepid process 2204 98e0809917278f2487861ede52d85f97.exe 2204 98e0809917278f2487861ede52d85f97.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
98e0809917278f2487861ede52d85f97.exedescription pid process target process PID 2196 wrote to memory of 2592 2196 98e0809917278f2487861ede52d85f97.exe 98e0809917278f2487861ede52d85f97.exe PID 2196 wrote to memory of 2592 2196 98e0809917278f2487861ede52d85f97.exe 98e0809917278f2487861ede52d85f97.exe PID 2196 wrote to memory of 2592 2196 98e0809917278f2487861ede52d85f97.exe 98e0809917278f2487861ede52d85f97.exe PID 2196 wrote to memory of 2592 2196 98e0809917278f2487861ede52d85f97.exe 98e0809917278f2487861ede52d85f97.exe PID 2196 wrote to memory of 2204 2196 98e0809917278f2487861ede52d85f97.exe 98e0809917278f2487861ede52d85f97.exe PID 2196 wrote to memory of 2204 2196 98e0809917278f2487861ede52d85f97.exe 98e0809917278f2487861ede52d85f97.exe PID 2196 wrote to memory of 2204 2196 98e0809917278f2487861ede52d85f97.exe 98e0809917278f2487861ede52d85f97.exe PID 2196 wrote to memory of 2204 2196 98e0809917278f2487861ede52d85f97.exe 98e0809917278f2487861ede52d85f97.exe PID 2196 wrote to memory of 2204 2196 98e0809917278f2487861ede52d85f97.exe 98e0809917278f2487861ede52d85f97.exe PID 2196 wrote to memory of 2204 2196 98e0809917278f2487861ede52d85f97.exe 98e0809917278f2487861ede52d85f97.exe PID 2196 wrote to memory of 2204 2196 98e0809917278f2487861ede52d85f97.exe 98e0809917278f2487861ede52d85f97.exe PID 2196 wrote to memory of 2204 2196 98e0809917278f2487861ede52d85f97.exe 98e0809917278f2487861ede52d85f97.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\98e0809917278f2487861ede52d85f97.exe"C:\Users\Admin\AppData\Local\Temp\98e0809917278f2487861ede52d85f97.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\98e0809917278f2487861ede52d85f97.exe"C:\Users\Admin\AppData\Local\Temp\98e0809917278f2487861ede52d85f97.exe"2⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\98e0809917278f2487861ede52d85f97.exe"C:\Users\Admin\AppData\Local\Temp\98e0809917278f2487861ede52d85f97.exe"2⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- NTFS ADS
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2204