Analysis
-
max time kernel
79s -
max time network
85s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2023 15:40
Static task
static1
Behavioral task
behavioral1
Sample
Predictor V6.3/Predictor V6.3.9.exe
Resource
win10-20230703-en
General
-
Target
Predictor V6.3/Predictor V6.3.9.exe
-
Size
658KB
-
MD5
ab63396cb0774ac41107b7b112f81d5a
-
SHA1
f5dc67429147e886b01413472496576a2ee34075
-
SHA256
9a43c57f3e98bd69789e8ccbeef2c1b6b5a3b1d06d63257bb4bd58dffa23689d
-
SHA512
2121961ae2b154ba941af6937d0522505ec7e323094fb2edc7058194ae958bcf866bbbc7842924236b8635917800d0708eaabff6112f131f496189bb6e021699
-
SSDEEP
12288:BKwp3N7HPqUeL31VI1kR8BgrsEofzwHJem7OzwHJe0IhfiZ:swp97HyUeLFVIuRCgrsEorwpemIwpels
Malware Config
Extracted
bitrat
1.38
185.157.162.126:443
-
communication_password
a76d949640a165da25ccfe9a8fd82c8a
-
tor_process
tor
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
PowerShell.exedescription ioc process File opened for modification C:\Windows\System32\%AppData%\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\Windows PowerShell.lnk PowerShell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
explorer.exepid process 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Predictor V6.3.9.exePredictor V6.3.9.exePredictor V6.3.9.exedescription pid process target process PID 2140 set thread context of 4700 2140 Predictor V6.3.9.exe cmd.exe PID 4028 set thread context of 948 4028 Predictor V6.3.9.exe cmd.exe PID 1252 set thread context of 3216 1252 Predictor V6.3.9.exe cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 44 IoCs
Processes:
Predictor V6.3.9.execmd.exePredictor V6.3.9.exePowerShell.execmd.exePredictor V6.3.9.exeTaskmgr.execmd.exepid process 2140 Predictor V6.3.9.exe 4700 cmd.exe 4028 Predictor V6.3.9.exe 4676 PowerShell.exe 4676 PowerShell.exe 4676 PowerShell.exe 948 cmd.exe 948 cmd.exe 1252 Predictor V6.3.9.exe 1252 Predictor V6.3.9.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 3216 cmd.exe 3216 cmd.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Predictor V6.3.9.exePredictor V6.3.9.execmd.exePredictor V6.3.9.execmd.exepid process 2140 Predictor V6.3.9.exe 4028 Predictor V6.3.9.exe 4700 cmd.exe 1252 Predictor V6.3.9.exe 948 cmd.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
PowerShell.exeTaskmgr.exeexplorer.exedescription pid process Token: SeDebugPrivilege 4676 PowerShell.exe Token: SeDebugPrivilege 1536 Taskmgr.exe Token: SeSystemProfilePrivilege 1536 Taskmgr.exe Token: SeCreateGlobalPrivilege 1536 Taskmgr.exe Token: SeShutdownPrivilege 2580 explorer.exe -
Suspicious use of FindShellTrayWindow 45 IoCs
Processes:
Taskmgr.exepid process 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe -
Suspicious use of SendNotifyMessage 44 IoCs
Processes:
Taskmgr.exepid process 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe 1536 Taskmgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
explorer.exepid process 2580 explorer.exe 2580 explorer.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
Predictor V6.3.9.exePredictor V6.3.9.exePowerShell.exePredictor V6.3.9.exelaunchtm.execmd.execmd.exedescription pid process target process PID 2140 wrote to memory of 4700 2140 Predictor V6.3.9.exe cmd.exe PID 2140 wrote to memory of 4700 2140 Predictor V6.3.9.exe cmd.exe PID 2140 wrote to memory of 4700 2140 Predictor V6.3.9.exe cmd.exe PID 2140 wrote to memory of 4700 2140 Predictor V6.3.9.exe cmd.exe PID 4028 wrote to memory of 948 4028 Predictor V6.3.9.exe cmd.exe PID 4028 wrote to memory of 948 4028 Predictor V6.3.9.exe cmd.exe PID 4028 wrote to memory of 948 4028 Predictor V6.3.9.exe cmd.exe PID 4028 wrote to memory of 948 4028 Predictor V6.3.9.exe cmd.exe PID 4676 wrote to memory of 1252 4676 PowerShell.exe Predictor V6.3.9.exe PID 4676 wrote to memory of 1252 4676 PowerShell.exe Predictor V6.3.9.exe PID 1252 wrote to memory of 3216 1252 Predictor V6.3.9.exe cmd.exe PID 1252 wrote to memory of 3216 1252 Predictor V6.3.9.exe cmd.exe PID 1252 wrote to memory of 3216 1252 Predictor V6.3.9.exe cmd.exe PID 4860 wrote to memory of 1536 4860 launchtm.exe Taskmgr.exe PID 4860 wrote to memory of 1536 4860 launchtm.exe Taskmgr.exe PID 4700 wrote to memory of 2580 4700 cmd.exe explorer.exe PID 4700 wrote to memory of 2580 4700 cmd.exe explorer.exe PID 4700 wrote to memory of 2580 4700 cmd.exe explorer.exe PID 4700 wrote to memory of 2580 4700 cmd.exe explorer.exe PID 1252 wrote to memory of 3216 1252 Predictor V6.3.9.exe cmd.exe PID 948 wrote to memory of 1268 948 cmd.exe explorer.exe PID 948 wrote to memory of 1268 948 cmd.exe explorer.exe PID 948 wrote to memory of 1268 948 cmd.exe explorer.exe PID 948 wrote to memory of 1268 948 cmd.exe explorer.exe PID 4700 wrote to memory of 2580 4700 cmd.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Predictor V6.3\Predictor V6.3.9.exe"C:\Users\Admin\AppData\Local\Temp\Predictor V6.3\Predictor V6.3.9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\AppData\Local\Temp\Predictor V6.3\Predictor V6.3.9.exe"C:\Users\Admin\AppData\Local\Temp\Predictor V6.3\Predictor V6.3.9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"3⤵
-
C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe"PowerShell.exe" -noexit -command Set-Location -literalPath 'C:\Users\Admin\AppData\Local\Temp\Predictor V6.3'1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Predictor V6.3\Predictor V6.3.9.exe"C:\Users\Admin\AppData\Local\Temp\Predictor V6.3\Predictor V6.3.9.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\launchtm.exelaunchtm.exe /21⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Taskmgr.exe"C:\Windows\System32\Taskmgr.exe" /22⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1632843eFilesize
4.2MB
MD5e980fac8c8ead148f038a0f810ff8c2c
SHA1eda7a2f8ca27a1267fbba334f9719f7ba4ba9985
SHA256729b31ee99a3c26eef7ac808b8f6f845b5ef3251e1fea8a1cbc078ff1b32ccbe
SHA512be8e7e40dc78314eaa0cb9482ac439c9fe892fdb464529679ee7a48688fd382a22b05de4a57b17b461712dd5f9f02393dd35c11a5956798466fde3e9794ac3a1
-
C:\Users\Admin\AppData\Local\Temp\24fa106cFilesize
4.2MB
MD5e980fac8c8ead148f038a0f810ff8c2c
SHA1eda7a2f8ca27a1267fbba334f9719f7ba4ba9985
SHA256729b31ee99a3c26eef7ac808b8f6f845b5ef3251e1fea8a1cbc078ff1b32ccbe
SHA512be8e7e40dc78314eaa0cb9482ac439c9fe892fdb464529679ee7a48688fd382a22b05de4a57b17b461712dd5f9f02393dd35c11a5956798466fde3e9794ac3a1
-
C:\Users\Admin\AppData\Local\Temp\2f9e193aFilesize
4.2MB
MD5e980fac8c8ead148f038a0f810ff8c2c
SHA1eda7a2f8ca27a1267fbba334f9719f7ba4ba9985
SHA256729b31ee99a3c26eef7ac808b8f6f845b5ef3251e1fea8a1cbc078ff1b32ccbe
SHA512be8e7e40dc78314eaa0cb9482ac439c9fe892fdb464529679ee7a48688fd382a22b05de4a57b17b461712dd5f9f02393dd35c11a5956798466fde3e9794ac3a1
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wtm0lm11.fbv.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
memory/948-159-0x00007FFD5CC30000-0x00007FFD5CE25000-memory.dmpFilesize
2.0MB
-
memory/1252-162-0x00007FFD2CDA0000-0x00007FFD2E417000-memory.dmpFilesize
22.5MB
-
memory/1268-193-0x0000000001200000-0x00000000015CE000-memory.dmpFilesize
3.8MB
-
memory/1268-192-0x00007FFD5CC30000-0x00007FFD5CE25000-memory.dmpFilesize
2.0MB
-
memory/1536-165-0x000001EA88FE0000-0x000001EA88FE1000-memory.dmpFilesize
4KB
-
memory/1536-167-0x000001EA88FE0000-0x000001EA88FE1000-memory.dmpFilesize
4KB
-
memory/1536-177-0x000001EA88FE0000-0x000001EA88FE1000-memory.dmpFilesize
4KB
-
memory/1536-176-0x000001EA88FE0000-0x000001EA88FE1000-memory.dmpFilesize
4KB
-
memory/1536-175-0x000001EA88FE0000-0x000001EA88FE1000-memory.dmpFilesize
4KB
-
memory/1536-174-0x000001EA88FE0000-0x000001EA88FE1000-memory.dmpFilesize
4KB
-
memory/1536-173-0x000001EA88FE0000-0x000001EA88FE1000-memory.dmpFilesize
4KB
-
memory/1536-171-0x000001EA88FE0000-0x000001EA88FE1000-memory.dmpFilesize
4KB
-
memory/1536-172-0x000001EA88FE0000-0x000001EA88FE1000-memory.dmpFilesize
4KB
-
memory/1536-166-0x000001EA88FE0000-0x000001EA88FE1000-memory.dmpFilesize
4KB
-
memory/2140-133-0x00007FFD3E8A0000-0x00007FFD3FF17000-memory.dmpFilesize
22.5MB
-
memory/2580-183-0x0000000000600000-0x00000000009CE000-memory.dmpFilesize
3.8MB
-
memory/2580-189-0x0000000000600000-0x00000000009CE000-memory.dmpFilesize
3.8MB
-
memory/2580-191-0x00000000729E0000-0x0000000072A19000-memory.dmpFilesize
228KB
-
memory/2580-190-0x0000000072B70000-0x0000000072BA9000-memory.dmpFilesize
228KB
-
memory/2580-188-0x00000000009F0000-0x0000000000E23000-memory.dmpFilesize
4.2MB
-
memory/2580-180-0x00007FFD5CC30000-0x00007FFD5CE25000-memory.dmpFilesize
2.0MB
-
memory/3216-182-0x00007FFD5CC30000-0x00007FFD5CE25000-memory.dmpFilesize
2.0MB
-
memory/4028-138-0x00007FFD3BCF0000-0x00007FFD3D367000-memory.dmpFilesize
22.5MB
-
memory/4676-157-0x000001DB6C2C0000-0x000001DB6C336000-memory.dmpFilesize
472KB
-
memory/4676-156-0x000001DB6C1F0000-0x000001DB6C234000-memory.dmpFilesize
272KB
-
memory/4676-142-0x000001DB53190000-0x000001DB531B2000-memory.dmpFilesize
136KB
-
memory/4676-155-0x000001DB6B4F0000-0x000001DB6B500000-memory.dmpFilesize
64KB
-
memory/4676-154-0x000001DB6B4F0000-0x000001DB6B500000-memory.dmpFilesize
64KB
-
memory/4676-153-0x000001DB6B4F0000-0x000001DB6B500000-memory.dmpFilesize
64KB
-
memory/4676-163-0x00007FFD3E8C0000-0x00007FFD3F381000-memory.dmpFilesize
10.8MB
-
memory/4676-160-0x000001DB6C240000-0x000001DB6C25E000-memory.dmpFilesize
120KB
-
memory/4676-152-0x00007FFD3E8C0000-0x00007FFD3F381000-memory.dmpFilesize
10.8MB
-
memory/4700-136-0x00007FFD5CC30000-0x00007FFD5CE25000-memory.dmpFilesize
2.0MB