Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
01-09-2023 06:04
Behavioral task
behavioral1
Sample
Accountsetting.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Accountsetting.exe
Resource
win10v2004-20230831-en
General
-
Target
Accountsetting.exe
-
Size
6.2MB
-
MD5
0606141f3fad15f21ebf58bcd5c49f75
-
SHA1
098454df527c1315e80808328dc464286fa90859
-
SHA256
76f0851190aea6cb9add8591a662322bd88f742d85f62bcf54050fe5b380eed6
-
SHA512
1ddcedc9e695b29dc44a0799263c8c50d6c14adae9e0968a501ae25b387c3f4c1b9aed29380800a3c6cd734da0ac71d5d8151f51172ce133e7caa1ce0541df92
-
SSDEEP
98304:qgMl95DqZYNTvgSeRK0eINIehsEB0ylMlzg4x4hFq1u9roTkXWtHErGy3z6r5MNI:qFX5eGiK0aEKtP1+rGkX2Dry0f
Malware Config
Extracted
bitrat
1.38
rornfl12.duckdns.org:3072
-
communication_password
be767243ca8f574c740fb4c26cc6dceb
-
install_dir
chrome
-
install_file
chome.exe
-
tor_process
tor
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2244-1-0x0000000000400000-0x00000000010CD000-memory.dmp vmprotect behavioral1/memory/2244-5-0x0000000000400000-0x00000000010CD000-memory.dmp vmprotect behavioral1/memory/2244-19-0x0000000000400000-0x00000000010CD000-memory.dmp vmprotect behavioral1/memory/2244-20-0x0000000000400000-0x00000000010CD000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Accountsetting.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Windows\CurrentVersion\Run\chome = "C:\\Users\\Admin\\AppData\\Local\\chrome\\chome.exe" Accountsetting.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
Processes:
Accountsetting.exepid process 2244 Accountsetting.exe 2244 Accountsetting.exe 2244 Accountsetting.exe 2244 Accountsetting.exe 2244 Accountsetting.exe 2244 Accountsetting.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Accountsetting.exepid process 2244 Accountsetting.exe -
Suspicious behavior: RenamesItself 29 IoCs
Processes:
Accountsetting.exepid process 2244 Accountsetting.exe 2244 Accountsetting.exe 2244 Accountsetting.exe 2244 Accountsetting.exe 2244 Accountsetting.exe 2244 Accountsetting.exe 2244 Accountsetting.exe 2244 Accountsetting.exe 2244 Accountsetting.exe 2244 Accountsetting.exe 2244 Accountsetting.exe 2244 Accountsetting.exe 2244 Accountsetting.exe 2244 Accountsetting.exe 2244 Accountsetting.exe 2244 Accountsetting.exe 2244 Accountsetting.exe 2244 Accountsetting.exe 2244 Accountsetting.exe 2244 Accountsetting.exe 2244 Accountsetting.exe 2244 Accountsetting.exe 2244 Accountsetting.exe 2244 Accountsetting.exe 2244 Accountsetting.exe 2244 Accountsetting.exe 2244 Accountsetting.exe 2244 Accountsetting.exe 2244 Accountsetting.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Accountsetting.exedescription pid process Token: SeDebugPrivilege 2244 Accountsetting.exe Token: SeShutdownPrivilege 2244 Accountsetting.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Accountsetting.exepid process 2244 Accountsetting.exe 2244 Accountsetting.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Accountsetting.exe"C:\Users\Admin\AppData\Local\Temp\Accountsetting.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2244