Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2023 05:54
Behavioral task
behavioral1
Sample
ba.exe
Resource
win7-20230831-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
ba.exe
Resource
win10v2004-20230831-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
ba.exe
-
Size
3.8MB
-
MD5
5c97b08df1ac8a00b3a618ec5a26aeae
-
SHA1
3bcbff269229cb6a27f0f1554a845874b42d11a3
-
SHA256
1da5b144be7b321399e604ff0173fd831c9cd0588365f3dbf9f08a68d943b4d5
-
SHA512
a8c679d0386468e5e9b44f873c56bb5ae56ecc92d05f80d52550eca3dca3e915c1657986969d63a434f93eaff20c85b4cbb8eca363fd4131454c00a4eb9003f5
-
SSDEEP
98304:d77Pmq33rE/JDLPWZADUGer7B6iY74M/9mlwXVZ4FB:5+R/eZADUXR
Score
10/10
Malware Config
Extracted
Family
bitrat
Version
1.38
C2
rornfl12.duckdns.org:3072
Attributes
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
install_dir
chrome
-
install_file
updater
-
tor_process
tor
Signatures
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
ba.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4272677097-406801653-1594978504-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\updater = "C:\\Users\\Admin\\AppData\\Local\\chrome\\updater" ba.exe Set value (str) \REGISTRY\USER\S-1-5-21-4272677097-406801653-1594978504-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\updater = "C:\\Users\\Admin\\AppData\\Local\\chrome\\updater\uff00" ba.exe Set value (str) \REGISTRY\USER\S-1-5-21-4272677097-406801653-1594978504-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\updater = "C:\\Users\\Admin\\AppData\\Local\\chrome\\updater萀" ba.exe Set value (str) \REGISTRY\USER\S-1-5-21-4272677097-406801653-1594978504-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\updater = "C:\\Users\\Admin\\AppData\\Local\\chrome\\updater먀" ba.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
ba.exepid process 2000 ba.exe 2000 ba.exe 2000 ba.exe 2000 ba.exe 2000 ba.exe -
Suspicious behavior: RenamesItself 30 IoCs
Processes:
ba.exepid process 2000 ba.exe 2000 ba.exe 2000 ba.exe 2000 ba.exe 2000 ba.exe 2000 ba.exe 2000 ba.exe 2000 ba.exe 2000 ba.exe 2000 ba.exe 2000 ba.exe 2000 ba.exe 2000 ba.exe 2000 ba.exe 2000 ba.exe 2000 ba.exe 2000 ba.exe 2000 ba.exe 2000 ba.exe 2000 ba.exe 2000 ba.exe 2000 ba.exe 2000 ba.exe 2000 ba.exe 2000 ba.exe 2000 ba.exe 2000 ba.exe 2000 ba.exe 2000 ba.exe 2000 ba.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ba.exedescription pid process Token: SeShutdownPrivilege 2000 ba.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
ba.exepid process 2000 ba.exe 2000 ba.exe