Analysis
-
max time kernel
596s -
max time network
391s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
21-08-2023 15:40
Static task
static1
Behavioral task
behavioral1
Sample
Predictor V6.3/Predictor V6.3.9.exe
Resource
win10-20230703-en
General
-
Target
Predictor V6.3/Predictor V6.3.9.exe
-
Size
658KB
-
MD5
ab63396cb0774ac41107b7b112f81d5a
-
SHA1
f5dc67429147e886b01413472496576a2ee34075
-
SHA256
9a43c57f3e98bd69789e8ccbeef2c1b6b5a3b1d06d63257bb4bd58dffa23689d
-
SHA512
2121961ae2b154ba941af6937d0522505ec7e323094fb2edc7058194ae958bcf866bbbc7842924236b8635917800d0708eaabff6112f131f496189bb6e021699
-
SSDEEP
12288:BKwp3N7HPqUeL31VI1kR8BgrsEofzwHJem7OzwHJe0IhfiZ:swp97HyUeLFVIuRCgrsEorwpemIwpels
Malware Config
Extracted
bitrat
1.38
185.157.162.126:443
-
communication_password
a76d949640a165da25ccfe9a8fd82c8a
-
tor_process
tor
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
explorer.exepid process 4840 explorer.exe 4840 explorer.exe 4840 explorer.exe 4840 explorer.exe 4840 explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Predictor V6.3.9.exedescription pid process target process PID 4184 set thread context of 4804 4184 Predictor V6.3.9.exe cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NTFS ADS 2 IoCs
Processes:
explorer.exedescription ioc process File created C:\Users\Admin\AppData\Local:03-07-2023 explorer.exe File opened for modification C:\Users\Admin\AppData\Local:03-07-2023 explorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Predictor V6.3.9.execmd.exepid process 4184 Predictor V6.3.9.exe 4804 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
Predictor V6.3.9.execmd.exepid process 4184 Predictor V6.3.9.exe 4804 cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
explorer.exedescription pid process Token: SeShutdownPrivilege 4840 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
explorer.exepid process 4840 explorer.exe 4840 explorer.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
Predictor V6.3.9.execmd.exedescription pid process target process PID 4184 wrote to memory of 4804 4184 Predictor V6.3.9.exe cmd.exe PID 4184 wrote to memory of 4804 4184 Predictor V6.3.9.exe cmd.exe PID 4184 wrote to memory of 4804 4184 Predictor V6.3.9.exe cmd.exe PID 4184 wrote to memory of 4804 4184 Predictor V6.3.9.exe cmd.exe PID 4804 wrote to memory of 4840 4804 cmd.exe explorer.exe PID 4804 wrote to memory of 4840 4804 cmd.exe explorer.exe PID 4804 wrote to memory of 4840 4804 cmd.exe explorer.exe PID 4804 wrote to memory of 4840 4804 cmd.exe explorer.exe PID 4804 wrote to memory of 4840 4804 cmd.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Predictor V6.3\Predictor V6.3.9.exe"C:\Users\Admin\AppData\Local\Temp\Predictor V6.3\Predictor V6.3.9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.2MB
MD5d9a995ee7041126832c9088c03e68288
SHA13e0ad7a71c4b5976013b946a5c075a94c2660685
SHA2560bf219d88b2db83fc8f2d31e249aca03b02b4f4ef9ce175c05f36ac45ff61517
SHA512ab79f3ddc63e138c99bae2949edfb2d8b739bb67c4147931517c5baacb68961e3c973e560c3d59383dde16ba97170fc85af4a10016add3d6d7b4562b1c7c95a7