Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2023 09:53
Static task
static1
Behavioral task
behavioral1
Sample
98e0809917278f2487861ede52d85f97.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
98e0809917278f2487861ede52d85f97.exe
Resource
win10v2004-20230703-en
General
-
Target
98e0809917278f2487861ede52d85f97.exe
-
Size
2.7MB
-
MD5
98e0809917278f2487861ede52d85f97
-
SHA1
d22abc16310091741c5f963140a545ad886fb6f3
-
SHA256
9c176196e1ea1061400ed75a74b16784aa58e87710f516eb363f296d0f909fb0
-
SHA512
e342d5fbe794f141da8b9cd8dbb0d9c4655eda9c2b21dcec9a70a75c4d400f99c03c06b54262498774fd2c9be0680dbab71b8296d1d8ab22fc67a1f20f1df99f
-
SSDEEP
49152:R6j5pEmBa2lKdWFTXIRxPMvid7P9cSnWbe2aWsuHxxIcK3S/Y7w9b:R6j5mqKdmTqmviBjnqPsuRxBdq
Malware Config
Extracted
bitrat
1.35
publiquilla.linkpc.net:9089
-
communication_password
bfdba24ee3d61f0260c4dc1034c3ee43
-
install_dir
windowssecurirysercivehealtht
-
install_file
windowssecuritrysercive.exe
-
tor_process
tor
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2280-143-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/2280-144-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/2280-146-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/2280-149-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/2280-150-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/2280-152-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/2280-153-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/2280-154-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/2280-155-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/2280-156-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/2280-157-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/2280-158-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/2280-160-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/2280-161-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/2280-162-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/2280-164-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/2280-165-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
98e0809917278f2487861ede52d85f97.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\windowssecuritrysercive = "C:\\Users\\Admin\\AppData\\Local\\windowssecurirysercivehealtht\\windowssecuritrysercive.exe" 98e0809917278f2487861ede52d85f97.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
98e0809917278f2487861ede52d85f97.exepid process 2280 98e0809917278f2487861ede52d85f97.exe 2280 98e0809917278f2487861ede52d85f97.exe 2280 98e0809917278f2487861ede52d85f97.exe 2280 98e0809917278f2487861ede52d85f97.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
98e0809917278f2487861ede52d85f97.exedescription pid process target process PID 4292 set thread context of 2280 4292 98e0809917278f2487861ede52d85f97.exe 98e0809917278f2487861ede52d85f97.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
98e0809917278f2487861ede52d85f97.exepid process 4292 98e0809917278f2487861ede52d85f97.exe 4292 98e0809917278f2487861ede52d85f97.exe 4292 98e0809917278f2487861ede52d85f97.exe -
Suspicious behavior: RenamesItself 18 IoCs
Processes:
98e0809917278f2487861ede52d85f97.exepid process 2280 98e0809917278f2487861ede52d85f97.exe 2280 98e0809917278f2487861ede52d85f97.exe 2280 98e0809917278f2487861ede52d85f97.exe 2280 98e0809917278f2487861ede52d85f97.exe 2280 98e0809917278f2487861ede52d85f97.exe 2280 98e0809917278f2487861ede52d85f97.exe 2280 98e0809917278f2487861ede52d85f97.exe 2280 98e0809917278f2487861ede52d85f97.exe 2280 98e0809917278f2487861ede52d85f97.exe 2280 98e0809917278f2487861ede52d85f97.exe 2280 98e0809917278f2487861ede52d85f97.exe 2280 98e0809917278f2487861ede52d85f97.exe 2280 98e0809917278f2487861ede52d85f97.exe 2280 98e0809917278f2487861ede52d85f97.exe 2280 98e0809917278f2487861ede52d85f97.exe 2280 98e0809917278f2487861ede52d85f97.exe 2280 98e0809917278f2487861ede52d85f97.exe 2280 98e0809917278f2487861ede52d85f97.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
98e0809917278f2487861ede52d85f97.exe98e0809917278f2487861ede52d85f97.exedescription pid process Token: SeDebugPrivilege 4292 98e0809917278f2487861ede52d85f97.exe Token: SeShutdownPrivilege 2280 98e0809917278f2487861ede52d85f97.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
98e0809917278f2487861ede52d85f97.exepid process 2280 98e0809917278f2487861ede52d85f97.exe 2280 98e0809917278f2487861ede52d85f97.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
98e0809917278f2487861ede52d85f97.exedescription pid process target process PID 4292 wrote to memory of 2280 4292 98e0809917278f2487861ede52d85f97.exe 98e0809917278f2487861ede52d85f97.exe PID 4292 wrote to memory of 2280 4292 98e0809917278f2487861ede52d85f97.exe 98e0809917278f2487861ede52d85f97.exe PID 4292 wrote to memory of 2280 4292 98e0809917278f2487861ede52d85f97.exe 98e0809917278f2487861ede52d85f97.exe PID 4292 wrote to memory of 2280 4292 98e0809917278f2487861ede52d85f97.exe 98e0809917278f2487861ede52d85f97.exe PID 4292 wrote to memory of 2280 4292 98e0809917278f2487861ede52d85f97.exe 98e0809917278f2487861ede52d85f97.exe PID 4292 wrote to memory of 2280 4292 98e0809917278f2487861ede52d85f97.exe 98e0809917278f2487861ede52d85f97.exe PID 4292 wrote to memory of 2280 4292 98e0809917278f2487861ede52d85f97.exe 98e0809917278f2487861ede52d85f97.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\98e0809917278f2487861ede52d85f97.exe"C:\Users\Admin\AppData\Local\Temp\98e0809917278f2487861ede52d85f97.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\98e0809917278f2487861ede52d85f97.exe"C:\Users\Admin\AppData\Local\Temp\98e0809917278f2487861ede52d85f97.exe"2⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2280