Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
01-09-2023 06:05
Static task
static1
Behavioral task
behavioral1
Sample
boolhongupdater0.2.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
boolhongupdater0.2.exe
Resource
win10v2004-20230831-en
General
-
Target
boolhongupdater0.2.exe
-
Size
3.1MB
-
MD5
e03f0567a9bb99e664bdc1d12aa21677
-
SHA1
8483f5a57b107430cc899f5bfb1dfa434e3690a5
-
SHA256
4cb6e9aebf1e565f4cb11b4bddcf9b7afcf56c390c1e2d849a64b31b997547ae
-
SHA512
31c82a1ae1aa3799e6a96fd350baf7036c1abd9898f108ac478d7b10a63749353b644eeb691b9e108d0a4a7f8a1f11c0b051002e39a2f9c035fbfaf0dbef2dea
-
SSDEEP
49152:ImK/wTPCM7YgUtlCUr8j2f0alT7Vzw3OBT+7Gm8vo4j3cxeHHxzB1A1Jcea:IkKM7eXhgMT763OEv8wQsIVB61/a
Malware Config
Extracted
bitrat
1.38
rornfl12.duckdns.org:3072
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
install_dir
chrome
-
install_file
updater
-
tor_process
tor
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
MSBuild.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Windows\CurrentVersion\Run\updater = "C:\\Users\\Admin\\AppData\\Local\\chrome\\updater" MSBuild.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
MSBuild.exepid process 292 MSBuild.exe 292 MSBuild.exe 292 MSBuild.exe 292 MSBuild.exe 292 MSBuild.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
boolhongupdater0.2.exedescription pid process target process PID 2220 set thread context of 292 2220 boolhongupdater0.2.exe MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
boolhongupdater0.2.exeMSBuild.exedescription pid process Token: SeDebugPrivilege 2220 boolhongupdater0.2.exe Token: SeDebugPrivilege 292 MSBuild.exe Token: SeShutdownPrivilege 292 MSBuild.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
MSBuild.exepid process 292 MSBuild.exe 292 MSBuild.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
boolhongupdater0.2.exedescription pid process target process PID 2220 wrote to memory of 292 2220 boolhongupdater0.2.exe MSBuild.exe PID 2220 wrote to memory of 292 2220 boolhongupdater0.2.exe MSBuild.exe PID 2220 wrote to memory of 292 2220 boolhongupdater0.2.exe MSBuild.exe PID 2220 wrote to memory of 292 2220 boolhongupdater0.2.exe MSBuild.exe PID 2220 wrote to memory of 292 2220 boolhongupdater0.2.exe MSBuild.exe PID 2220 wrote to memory of 292 2220 boolhongupdater0.2.exe MSBuild.exe PID 2220 wrote to memory of 292 2220 boolhongupdater0.2.exe MSBuild.exe PID 2220 wrote to memory of 292 2220 boolhongupdater0.2.exe MSBuild.exe PID 2220 wrote to memory of 292 2220 boolhongupdater0.2.exe MSBuild.exe PID 2220 wrote to memory of 292 2220 boolhongupdater0.2.exe MSBuild.exe PID 2220 wrote to memory of 292 2220 boolhongupdater0.2.exe MSBuild.exe PID 2220 wrote to memory of 292 2220 boolhongupdater0.2.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\boolhongupdater0.2.exe"C:\Users\Admin\AppData\Local\Temp\boolhongupdater0.2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe2⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:292