Analysis
-
max time kernel
1196s -
max time network
1202s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
submitted
02-11-2023 18:21
Static task
static1
1 signatures
General
-
Target
XBMr.sct.dll
-
Size
1.3MB
-
MD5
30ab06a3bf1ec8ae7bd02ef4ce79719f
-
SHA1
9a0567614d857e13b9792a5b02b14dc95cd82c70
-
SHA256
1c125a10c33d862e6179b6827131e1aac587d23f1b7be0dbcb32571d70e34de4
-
SHA512
34e2d744e24609a2d985064b60f8cf4e96a91b4a107120e6577cd28c82298403e2de85c5ca5c316c9239b568addb892ac713793dd1a3640334fde8edb5fdf32c
-
SSDEEP
24576:XDOgwgfYbK9s3kW3CG3vQ3snpR7loatbEUZqHwhv642THJ1r63LSw7b8VzkPPjwm:XDOyfYbK9sZvw8V/qQeHf6JUawknjH
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2360-6-0x0000000000F70000-0x0000000000FBC000-memory.dmp pikabot_core behavioral1/memory/2360-8-0x0000000000F70000-0x0000000000FBC000-memory.dmp pikabot_core behavioral1/memory/2360-9-0x0000000000F70000-0x0000000000FBC000-memory.dmp pikabot_core behavioral1/memory/2360-10-0x0000000000F70000-0x0000000000FBC000-memory.dmp pikabot_core behavioral1/memory/2360-11-0x0000000000F70000-0x0000000000FBC000-memory.dmp pikabot_core behavioral1/memory/2360-14-0x0000000000F70000-0x0000000000FBC000-memory.dmp pikabot_core behavioral1/memory/2360-26-0x0000000000F70000-0x0000000000FBC000-memory.dmp pikabot_core behavioral1/memory/2360-38-0x0000000000F70000-0x0000000000FBC000-memory.dmp pikabot_core behavioral1/memory/2360-50-0x0000000000F70000-0x0000000000FBC000-memory.dmp pikabot_core behavioral1/memory/2360-52-0x0000000000F70000-0x0000000000FBC000-memory.dmp pikabot_core behavioral1/memory/2360-64-0x0000000000F70000-0x0000000000FBC000-memory.dmp pikabot_core behavioral1/memory/2360-66-0x0000000000F70000-0x0000000000FBC000-memory.dmp pikabot_core -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 2448 set thread context of 2360 2448 rundll32.exe SearchProtocolHost.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exenetstat.exepid process 2216 ipconfig.exe 4420 netstat.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
SearchProtocolHost.exepid process 2360 SearchProtocolHost.exe 2360 SearchProtocolHost.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
Processes:
rundll32.exepid process 2448 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
Processes:
whoami.exenetstat.exedescription pid process Token: SeDebugPrivilege 2748 whoami.exe Token: SeDebugPrivilege 2748 whoami.exe Token: SeDebugPrivilege 2748 whoami.exe Token: SeDebugPrivilege 2748 whoami.exe Token: SeDebugPrivilege 2748 whoami.exe Token: SeDebugPrivilege 2748 whoami.exe Token: SeDebugPrivilege 2748 whoami.exe Token: SeDebugPrivilege 2748 whoami.exe Token: SeDebugPrivilege 2748 whoami.exe Token: SeDebugPrivilege 2748 whoami.exe Token: SeDebugPrivilege 2748 whoami.exe Token: SeDebugPrivilege 2748 whoami.exe Token: SeDebugPrivilege 2748 whoami.exe Token: SeDebugPrivilege 2748 whoami.exe Token: SeDebugPrivilege 2748 whoami.exe Token: SeDebugPrivilege 2748 whoami.exe Token: SeDebugPrivilege 2748 whoami.exe Token: SeDebugPrivilege 2748 whoami.exe Token: SeDebugPrivilege 2748 whoami.exe Token: SeDebugPrivilege 2748 whoami.exe Token: SeDebugPrivilege 2748 whoami.exe Token: SeDebugPrivilege 2748 whoami.exe Token: SeDebugPrivilege 2748 whoami.exe Token: SeDebugPrivilege 2748 whoami.exe Token: SeDebugPrivilege 2748 whoami.exe Token: SeDebugPrivilege 2748 whoami.exe Token: SeDebugPrivilege 2748 whoami.exe Token: SeDebugPrivilege 4420 netstat.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1912 wrote to memory of 2448 1912 rundll32.exe rundll32.exe PID 1912 wrote to memory of 2448 1912 rundll32.exe rundll32.exe PID 1912 wrote to memory of 2448 1912 rundll32.exe rundll32.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe PID 2448 wrote to memory of 2360 2448 rundll32.exe SearchProtocolHost.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\XBMr.sct.dll, Crash1⤵
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\XBMr.sct.dll, Crash2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\SearchProtocolHost.exe"C:\Windows\System32\SearchProtocolHost.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2360 -
C:\Windows\SysWOW64\whoami.exewhoami.exe /all4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig.exe /all4⤵
- Gathers network information
PID:2216
-
-
C:\Windows\SysWOW64\netstat.exenetstat.exe -aon4⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:4420
-
-
-