Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2023 05:54
Behavioral task
behavioral1
Sample
nomal1.exe
Resource
win7-20230831-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
nomal1.exe
Resource
win10v2004-20230831-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
nomal1.exe
-
Size
3.8MB
-
MD5
5c97b08df1ac8a00b3a618ec5a26aeae
-
SHA1
3bcbff269229cb6a27f0f1554a845874b42d11a3
-
SHA256
1da5b144be7b321399e604ff0173fd831c9cd0588365f3dbf9f08a68d943b4d5
-
SHA512
a8c679d0386468e5e9b44f873c56bb5ae56ecc92d05f80d52550eca3dca3e915c1657986969d63a434f93eaff20c85b4cbb8eca363fd4131454c00a4eb9003f5
-
SSDEEP
98304:d77Pmq33rE/JDLPWZADUGer7B6iY74M/9mlwXVZ4FB:5+R/eZADUXR
Score
10/10
Malware Config
Extracted
Family
bitrat
Version
1.38
C2
rornfl12.duckdns.org:3072
Attributes
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
install_dir
chrome
-
install_file
updater
-
tor_process
tor
Signatures
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
nomal1.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1980726966-773384374-2129981223-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\updater = "C:\\Users\\Admin\\AppData\\Local\\chrome\\updater䜀" nomal1.exe Set value (str) \REGISTRY\USER\S-1-5-21-1980726966-773384374-2129981223-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\updater = "C:\\Users\\Admin\\AppData\\Local\\chrome\\updater" nomal1.exe Set value (str) \REGISTRY\USER\S-1-5-21-1980726966-773384374-2129981223-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\updater = "C:\\Users\\Admin\\AppData\\Local\\chrome\\updater먀" nomal1.exe Set value (str) \REGISTRY\USER\S-1-5-21-1980726966-773384374-2129981223-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\updater = "C:\\Users\\Admin\\AppData\\Local\\chrome\\updaterԀ" nomal1.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
nomal1.exepid process 3388 nomal1.exe 3388 nomal1.exe 3388 nomal1.exe 3388 nomal1.exe 3388 nomal1.exe -
Suspicious behavior: RenamesItself 29 IoCs
Processes:
nomal1.exepid process 3388 nomal1.exe 3388 nomal1.exe 3388 nomal1.exe 3388 nomal1.exe 3388 nomal1.exe 3388 nomal1.exe 3388 nomal1.exe 3388 nomal1.exe 3388 nomal1.exe 3388 nomal1.exe 3388 nomal1.exe 3388 nomal1.exe 3388 nomal1.exe 3388 nomal1.exe 3388 nomal1.exe 3388 nomal1.exe 3388 nomal1.exe 3388 nomal1.exe 3388 nomal1.exe 3388 nomal1.exe 3388 nomal1.exe 3388 nomal1.exe 3388 nomal1.exe 3388 nomal1.exe 3388 nomal1.exe 3388 nomal1.exe 3388 nomal1.exe 3388 nomal1.exe 3388 nomal1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
nomal1.exedescription pid process Token: SeShutdownPrivilege 3388 nomal1.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
nomal1.exepid process 3388 nomal1.exe 3388 nomal1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\nomal1.exe"C:\Users\Admin\AppData\Local\Temp\nomal1.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3388