Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
173s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2023, 08:51
Behavioral task
behavioral1
Sample
megusz.exe
Resource
win7-20230712-en
5 signatures
150 seconds
General
-
Target
megusz.exe
-
Size
1.4MB
-
MD5
358384b8f4f4ceb8035072ed72fa165d
-
SHA1
63c38135f9ac72fe1410c08327759ac8a14b2d42
-
SHA256
8dd536083c6ed59bc8a88d3df2eef87142a69c48fb4e6594ac606aaafd5c7594
-
SHA512
31f248f179c13ff5afc550d7fe650635782585f4b706231d3315b55e82546770b27128834efccae834f991306422e9fd03e6697f35b5ae377c1e377f4c9e4dd8
-
SSDEEP
24576:QndRKZCy2BrhCeU2i2cJijFbCBTPmiY05tJMSQp5ysA7Yg1nLkz1G3BU+:SXDFBU2iIBb0xY/6sUYYgo
Malware Config
Extracted
Family
bitrat
Version
1.38
C2
208.67.104.96:1234
Attributes
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
tor_process
tor
Signatures
-
resource yara_rule behavioral2/memory/3636-133-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3636-134-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3636-137-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3636-138-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3636-139-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3636-140-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3636-141-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3636-142-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3636-143-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3636-144-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3636-147-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3636-148-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3636-149-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3636-150-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3636-151-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 3636 megusz.exe 3636 megusz.exe 3636 megusz.exe 3636 megusz.exe 3636 megusz.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 3636 megusz.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3636 megusz.exe 3636 megusz.exe