Analysis
-
max time kernel
143s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-09-2023 02:00
Behavioral task
behavioral1
Sample
87529f31044250fd9875f8bad65288ee.exe
Resource
win7-20230831-en
windows7-x64
5 signatures
150 seconds
General
-
Target
87529f31044250fd9875f8bad65288ee.exe
-
Size
1.4MB
-
MD5
87529f31044250fd9875f8bad65288ee
-
SHA1
dacde2a83cadb215d80f8d43e8ec9c5a319f2be4
-
SHA256
9703ceb0a81a5784087ef0a1046b0237caee1ac1fdda50f8339ab2722f904020
-
SHA512
db06fbf5942f813e4bee5c9a659639514bfe35f26fcc729b1c5851d790b3fba27f8065dd063adefa6338f36405d7575aaf1d8b4a36c839be470838a7781fe83c
-
SSDEEP
24576:kndRKZCy2BrhCeU2i2cJijFbCBTPmiY05tJMSQp5ysA7Yg1nLkzbAkyHi93L+ZHa:eXDFBU2iIBb0xY/6sUYYkAkyHsm5
Malware Config
Extracted
Family
bitrat
Version
1.38
C2
febbit1.ddns.net:6655
Attributes
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
tor_process
tor
Signatures
-
Processes:
resource yara_rule behavioral1/memory/3028-0-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/3028-1-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/3028-3-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/3028-4-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/3028-6-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/3028-8-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/3028-9-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/3028-11-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/3028-12-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/3028-14-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
87529f31044250fd9875f8bad65288ee.exepid process 3028 87529f31044250fd9875f8bad65288ee.exe 3028 87529f31044250fd9875f8bad65288ee.exe 3028 87529f31044250fd9875f8bad65288ee.exe 3028 87529f31044250fd9875f8bad65288ee.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
87529f31044250fd9875f8bad65288ee.exedescription pid process Token: SeDebugPrivilege 3028 87529f31044250fd9875f8bad65288ee.exe Token: SeShutdownPrivilege 3028 87529f31044250fd9875f8bad65288ee.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
87529f31044250fd9875f8bad65288ee.exepid process 3028 87529f31044250fd9875f8bad65288ee.exe 3028 87529f31044250fd9875f8bad65288ee.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3028-0-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/3028-1-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/3028-3-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/3028-4-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/3028-6-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/3028-8-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/3028-9-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/3028-11-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/3028-12-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/3028-14-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB