Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2023 13:35
Static task
static1
Behavioral task
behavioral1
Sample
AlmiqueArtilleryman_pkb.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
AlmiqueArtilleryman_pkb.dll
Resource
win10v2004-20231020-en
Behavioral task
behavioral3
Sample
launcher.bat
Resource
win7-20231020-en
General
-
Target
launcher.bat
-
Size
78B
-
MD5
b798e505cab8b4485e6564c2ebe7ca9a
-
SHA1
dcae7a12511993699e426df80c6a685f0b516d49
-
SHA256
6c09f67e986a895de62234143490469fcc8bc393c4cc5e8d58346ea5e6f77395
-
SHA512
9743066cbd1ce7d2795dfbe97ad268258fadd7846bbd9e3ccd25db613d11653fabfd7c1501becad4a5bae332629e8275cedbdd292584ac856770b57d581100bb
Malware Config
Signatures
-
Detects PikaBot botnet 6 IoCs
Processes:
resource yara_rule behavioral4/memory/1140-7-0x0000000000840000-0x0000000000891000-memory.dmp family_pikabot_v2 behavioral4/memory/1140-9-0x0000000000840000-0x0000000000891000-memory.dmp family_pikabot_v2 behavioral4/memory/1140-10-0x0000000000840000-0x0000000000891000-memory.dmp family_pikabot_v2 behavioral4/memory/1140-12-0x0000000000840000-0x0000000000891000-memory.dmp family_pikabot_v2 behavioral4/memory/1140-13-0x0000000000840000-0x0000000000891000-memory.dmp family_pikabot_v2 behavioral4/memory/1140-16-0x0000000000840000-0x0000000000891000-memory.dmp family_pikabot_v2 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 748 set thread context of 1140 748 rundll32.exe SearchProtocolHost.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exenetstat.exepid process 2984 ipconfig.exe 1904 netstat.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
SearchProtocolHost.exepid process 1140 SearchProtocolHost.exe 1140 SearchProtocolHost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
rundll32.exepid process 748 rundll32.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
Processes:
rundll32.exepid process 748 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
Processes:
whoami.exenetstat.exedescription pid process Token: SeDebugPrivilege 3868 whoami.exe Token: SeDebugPrivilege 3868 whoami.exe Token: SeDebugPrivilege 3868 whoami.exe Token: SeDebugPrivilege 3868 whoami.exe Token: SeDebugPrivilege 3868 whoami.exe Token: SeDebugPrivilege 3868 whoami.exe Token: SeDebugPrivilege 3868 whoami.exe Token: SeDebugPrivilege 3868 whoami.exe Token: SeDebugPrivilege 3868 whoami.exe Token: SeDebugPrivilege 3868 whoami.exe Token: SeDebugPrivilege 3868 whoami.exe Token: SeDebugPrivilege 3868 whoami.exe Token: SeDebugPrivilege 3868 whoami.exe Token: SeDebugPrivilege 3868 whoami.exe Token: SeDebugPrivilege 3868 whoami.exe Token: SeDebugPrivilege 3868 whoami.exe Token: SeDebugPrivilege 3868 whoami.exe Token: SeDebugPrivilege 3868 whoami.exe Token: SeDebugPrivilege 3868 whoami.exe Token: SeDebugPrivilege 3868 whoami.exe Token: SeDebugPrivilege 3868 whoami.exe Token: SeDebugPrivilege 3868 whoami.exe Token: SeDebugPrivilege 3868 whoami.exe Token: SeDebugPrivilege 3868 whoami.exe Token: SeDebugPrivilege 3868 whoami.exe Token: SeDebugPrivilege 3868 whoami.exe Token: SeDebugPrivilege 3868 whoami.exe Token: SeDebugPrivilege 1904 netstat.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exerundll32.exerundll32.exedescription pid process target process PID 408 wrote to memory of 4584 408 cmd.exe rundll32.exe PID 408 wrote to memory of 4584 408 cmd.exe rundll32.exe PID 4584 wrote to memory of 748 4584 rundll32.exe rundll32.exe PID 4584 wrote to memory of 748 4584 rundll32.exe rundll32.exe PID 4584 wrote to memory of 748 4584 rundll32.exe rundll32.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe PID 748 wrote to memory of 1140 748 rundll32.exe SearchProtocolHost.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\launcher.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\system32\rundll32.exerundll32.exe AlmiqueArtilleryman_pkb.dll, Throw2⤵
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe AlmiqueArtilleryman_pkb.dll, Throw3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\SearchProtocolHost.exe"C:\Windows\System32\SearchProtocolHost.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
PID:1140 -
C:\Windows\SysWOW64\whoami.exewhoami.exe /all5⤵
- Suspicious use of AdjustPrivilegeToken
PID:3868
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig.exe /all5⤵
- Gathers network information
PID:2984
-
-
C:\Windows\SysWOW64\netstat.exenetstat.exe -aon5⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
-
-
-