Analysis
-
max time kernel
118s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 10:49
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe
Resource
win10v2004-20230915-en
General
-
Target
SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe
-
Size
542KB
-
MD5
cb8d2cb4372947471ba2f6a7bc3a9c35
-
SHA1
bcf8b0c9f36c33902b11c5e3b3942143068f52ce
-
SHA256
4f09e1857f411cee21a8f8b56535dcf67937ec013873c180215c6420856b4e17
-
SHA512
65fe838186ef865cc4229b04df7268aa1c410fafe64d7264fb6489e5158ec0cbc690730451d1e5c1e22d5010c20771419071f5b512052a7b7bd9382e62a01163
-
SSDEEP
1536:NPd/84RBumqgMUAxEUZ45zT8VXJci2ejtP7nRCHlTigBVrFuOL5aZcThsZ:ZuvgMUOEUvVXJV2ejtlyluOLb
Malware Config
Extracted
originbotnet
https://lamba.nitrosoftwares.shop/gate
-
add_startup
false
-
download_folder_name
zeyy4dqc.kds
-
hide_file_startup
false
-
startup_directory_name
efUDQ
-
startup_environment_name
appdata
-
startup_installation_name
efUDQ.exe
-
startup_registry_name
efUDQ
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
Signatures
-
OriginBotnet
OriginBotnet is a remote access trojan written in C#.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2264 set thread context of 1700 2264 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe 30 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1700 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe 1700 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1700 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2264 wrote to memory of 1700 2264 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe 30 PID 2264 wrote to memory of 1700 2264 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe 30 PID 2264 wrote to memory of 1700 2264 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe 30 PID 2264 wrote to memory of 1700 2264 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe 30 PID 2264 wrote to memory of 1700 2264 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe 30 PID 2264 wrote to memory of 1700 2264 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe 30 PID 2264 wrote to memory of 1700 2264 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe 30 PID 2264 wrote to memory of 1700 2264 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe 30 PID 2264 wrote to memory of 1700 2264 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe 30 PID 2264 wrote to memory of 2880 2264 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe 31 PID 2264 wrote to memory of 2880 2264 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe 31 PID 2264 wrote to memory of 2880 2264 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe 31 PID 2264 wrote to memory of 2880 2264 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\svchost"2⤵PID:2880
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\svchost\svchost.exe'" /f2⤵PID:2652
-