Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
13-11-2023 08:11
Static task
static1
Behavioral task
behavioral1
Sample
5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe
Resource
win10-20231020-en
General
-
Target
5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe
-
Size
4.6MB
-
MD5
18659566d6597e168fd75f0f64ae0acf
-
SHA1
fff293bd1462125fe483746807abfd78d7e7a68e
-
SHA256
5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d
-
SHA512
a51845c1b5d2971ea77adfdd49e66b6ab2a4ec3ea23fc1f4913bf26c1204c6a4c87785ae5e09730d8efcbb934c991a8be0d689308f9de058d81f04560b3b9282
-
SSDEEP
98304:4lxNooNy3ezMYFgCMGoVGjjCSsVzQBh9pAO5PuKBeVUFyiZuqnv:2KojxasoO6zQBGO5PNsVUF9u
Malware Config
Extracted
bitrat
1.38
185.31.111.198:25001
-
communication_password
d7dcd79b773dc85c89b84862cdedb6cf
-
install_dir
temp
-
install_file
system.exe
-
tor_process
tor
Signatures
-
Detects DLL dropped by Raspberry Robin. 2 IoCs
Raspberry Robin.
resource yara_rule behavioral1/memory/2304-12-0x0000000076E80000-0x0000000076F9F000-memory.dmp Raspberry_Robin_DLL_MAY_2022 behavioral1/memory/2304-31-0x0000000076E80000-0x0000000076F9F000-memory.dmp Raspberry_Robin_DLL_MAY_2022 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2304 set thread context of 2812 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 38 -
Program crash 1 IoCs
pid pid_target Process procid_target 2844 2812 WerFault.exe 38 -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2788 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 29 PID 2304 wrote to memory of 2788 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 29 PID 2304 wrote to memory of 2788 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 29 PID 2304 wrote to memory of 2816 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 30 PID 2304 wrote to memory of 2816 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 30 PID 2304 wrote to memory of 2816 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 30 PID 2304 wrote to memory of 2800 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 31 PID 2304 wrote to memory of 2800 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 31 PID 2304 wrote to memory of 2800 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 31 PID 2304 wrote to memory of 2728 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 32 PID 2304 wrote to memory of 2728 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 32 PID 2304 wrote to memory of 2728 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 32 PID 2304 wrote to memory of 3028 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 33 PID 2304 wrote to memory of 3028 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 33 PID 2304 wrote to memory of 3028 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 33 PID 2304 wrote to memory of 2680 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 34 PID 2304 wrote to memory of 2680 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 34 PID 2304 wrote to memory of 2680 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 34 PID 2304 wrote to memory of 2804 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 35 PID 2304 wrote to memory of 2804 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 35 PID 2304 wrote to memory of 2804 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 35 PID 2304 wrote to memory of 2824 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 36 PID 2304 wrote to memory of 2824 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 36 PID 2304 wrote to memory of 2824 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 36 PID 2304 wrote to memory of 2496 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 37 PID 2304 wrote to memory of 2496 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 37 PID 2304 wrote to memory of 2496 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 37 PID 2304 wrote to memory of 2812 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 38 PID 2304 wrote to memory of 2812 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 38 PID 2304 wrote to memory of 2812 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 38 PID 2304 wrote to memory of 2812 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 38 PID 2304 wrote to memory of 2812 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 38 PID 2304 wrote to memory of 2812 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 38 PID 2304 wrote to memory of 2812 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 38 PID 2304 wrote to memory of 2812 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 38 PID 2304 wrote to memory of 2812 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 38 PID 2304 wrote to memory of 2812 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 38 PID 2304 wrote to memory of 2812 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 38 PID 2304 wrote to memory of 2812 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 38 PID 2304 wrote to memory of 2812 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 38 PID 2304 wrote to memory of 2812 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 38 PID 2304 wrote to memory of 2812 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 38 PID 2304 wrote to memory of 2812 2304 5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe 38 PID 2812 wrote to memory of 2844 2812 Setup.exe 39 PID 2812 wrote to memory of 2844 2812 Setup.exe 39 PID 2812 wrote to memory of 2844 2812 Setup.exe 39 PID 2812 wrote to memory of 2844 2812 Setup.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe"C:\Users\Admin\AppData\Local\Temp\5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"2⤵PID:2788
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"2⤵PID:2816
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"2⤵PID:2800
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:2728
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regtlibv12.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regtlibv12.exe"2⤵PID:3028
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"2⤵PID:2680
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"2⤵PID:2804
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe"2⤵PID:2824
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"2⤵PID:2496
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\Setup.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\Setup.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2812 -s 3043⤵
- Program crash
PID:2844
-
-