Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2023 02:00
Behavioral task
behavioral1
Sample
87529f31044250fd9875f8bad65288ee.exe
Resource
win7-20230831-en
windows7-x64
5 signatures
150 seconds
General
-
Target
87529f31044250fd9875f8bad65288ee.exe
-
Size
1.4MB
-
MD5
87529f31044250fd9875f8bad65288ee
-
SHA1
dacde2a83cadb215d80f8d43e8ec9c5a319f2be4
-
SHA256
9703ceb0a81a5784087ef0a1046b0237caee1ac1fdda50f8339ab2722f904020
-
SHA512
db06fbf5942f813e4bee5c9a659639514bfe35f26fcc729b1c5851d790b3fba27f8065dd063adefa6338f36405d7575aaf1d8b4a36c839be470838a7781fe83c
-
SSDEEP
24576:kndRKZCy2BrhCeU2i2cJijFbCBTPmiY05tJMSQp5ysA7Yg1nLkzbAkyHi93L+ZHa:eXDFBU2iIBb0xY/6sUYYkAkyHsm5
Malware Config
Extracted
Family
bitrat
Version
1.38
C2
febbit1.ddns.net:6655
Attributes
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
tor_process
tor
Signatures
-
Processes:
resource yara_rule behavioral2/memory/1444-0-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/1444-4-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/1444-5-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
87529f31044250fd9875f8bad65288ee.exepid process 1444 87529f31044250fd9875f8bad65288ee.exe 1444 87529f31044250fd9875f8bad65288ee.exe 1444 87529f31044250fd9875f8bad65288ee.exe 1444 87529f31044250fd9875f8bad65288ee.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
87529f31044250fd9875f8bad65288ee.exedescription pid process Token: SeShutdownPrivilege 1444 87529f31044250fd9875f8bad65288ee.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
87529f31044250fd9875f8bad65288ee.exepid process 1444 87529f31044250fd9875f8bad65288ee.exe 1444 87529f31044250fd9875f8bad65288ee.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1444-0-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1444-1-0x0000000074440000-0x0000000074479000-memory.dmpFilesize
228KB
-
memory/1444-2-0x00000000747E0000-0x0000000074819000-memory.dmpFilesize
228KB
-
memory/1444-3-0x00000000747E0000-0x0000000074819000-memory.dmpFilesize
228KB
-
memory/1444-4-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1444-5-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1444-13-0x00000000747E0000-0x0000000074819000-memory.dmpFilesize
228KB