Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
27-08-2023 10:33
Static task
static1
Behavioral task
behavioral1
Sample
2d4c73a07bc7f749b009ca30d6527ad8c25b6a6c107df5aef95ec311b5016cdb.exe
Resource
win7-20230712-en
General
-
Target
2d4c73a07bc7f749b009ca30d6527ad8c25b6a6c107df5aef95ec311b5016cdb.exe
-
Size
2.9MB
-
MD5
5b374f9893598fb7323a6fcc8a773418
-
SHA1
6fc6e18654fe76c2f057905ead38eadee0510e14
-
SHA256
2d4c73a07bc7f749b009ca30d6527ad8c25b6a6c107df5aef95ec311b5016cdb
-
SHA512
565970252145bc7f7ce692a5df60f83671c2ee7579d4779f95f8b2abca7c5764f9734fd1a2a898204e6f1d77361554da78162567e47bfed81ec83877a92b4d6e
-
SSDEEP
49152:kypQPq91dnWo21VjJVnDZo23Y2cj2/A4BD9DpTGqEme2CdXPckRBSBjTF:kybnWo2LjPDZB3Ypj2/AsrhE728XKF
Malware Config
Extracted
bitrat
1.34
gordon6.hopto.org:1515
-
communication_password
827ccb0eea8a706c4c34a16891f84e7b
-
tor_process
tor
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2920-6-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2920-7-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2920-8-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2920-11-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2920-12-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2920-13-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2920-15-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2920-16-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2920-14-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2920-17-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2920-18-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2920-19-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2920-20-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2920-21-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2920-22-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2920-23-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2920-24-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2920-25-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2920-26-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
AddInProcess32.exepid process 2920 AddInProcess32.exe 2920 AddInProcess32.exe 2920 AddInProcess32.exe 2920 AddInProcess32.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
2d4c73a07bc7f749b009ca30d6527ad8c25b6a6c107df5aef95ec311b5016cdb.exedescription pid process target process PID 2632 set thread context of 2920 2632 2d4c73a07bc7f749b009ca30d6527ad8c25b6a6c107df5aef95ec311b5016cdb.exe AddInProcess32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
2d4c73a07bc7f749b009ca30d6527ad8c25b6a6c107df5aef95ec311b5016cdb.exeAddInProcess32.exedescription pid process Token: SeDebugPrivilege 2632 2d4c73a07bc7f749b009ca30d6527ad8c25b6a6c107df5aef95ec311b5016cdb.exe Token: SeDebugPrivilege 2920 AddInProcess32.exe Token: SeShutdownPrivilege 2920 AddInProcess32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AddInProcess32.exepid process 2920 AddInProcess32.exe 2920 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
2d4c73a07bc7f749b009ca30d6527ad8c25b6a6c107df5aef95ec311b5016cdb.exedescription pid process target process PID 2632 wrote to memory of 2920 2632 2d4c73a07bc7f749b009ca30d6527ad8c25b6a6c107df5aef95ec311b5016cdb.exe AddInProcess32.exe PID 2632 wrote to memory of 2920 2632 2d4c73a07bc7f749b009ca30d6527ad8c25b6a6c107df5aef95ec311b5016cdb.exe AddInProcess32.exe PID 2632 wrote to memory of 2920 2632 2d4c73a07bc7f749b009ca30d6527ad8c25b6a6c107df5aef95ec311b5016cdb.exe AddInProcess32.exe PID 2632 wrote to memory of 2920 2632 2d4c73a07bc7f749b009ca30d6527ad8c25b6a6c107df5aef95ec311b5016cdb.exe AddInProcess32.exe PID 2632 wrote to memory of 2920 2632 2d4c73a07bc7f749b009ca30d6527ad8c25b6a6c107df5aef95ec311b5016cdb.exe AddInProcess32.exe PID 2632 wrote to memory of 2920 2632 2d4c73a07bc7f749b009ca30d6527ad8c25b6a6c107df5aef95ec311b5016cdb.exe AddInProcess32.exe PID 2632 wrote to memory of 2920 2632 2d4c73a07bc7f749b009ca30d6527ad8c25b6a6c107df5aef95ec311b5016cdb.exe AddInProcess32.exe PID 2632 wrote to memory of 2920 2632 2d4c73a07bc7f749b009ca30d6527ad8c25b6a6c107df5aef95ec311b5016cdb.exe AddInProcess32.exe PID 2632 wrote to memory of 2920 2632 2d4c73a07bc7f749b009ca30d6527ad8c25b6a6c107df5aef95ec311b5016cdb.exe AddInProcess32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d4c73a07bc7f749b009ca30d6527ad8c25b6a6c107df5aef95ec311b5016cdb.exe"C:\Users\Admin\AppData\Local\Temp\2d4c73a07bc7f749b009ca30d6527ad8c25b6a6c107df5aef95ec311b5016cdb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2920