Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2023 14:28
Static task
static1
Behavioral task
behavioral1
Sample
AlmiqueArtilleryman_pkb2.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
AlmiqueArtilleryman_pkb2.dll
Resource
win10v2004-20231020-en
Behavioral task
behavioral3
Sample
launcher.bat
Resource
win7-20231020-en
General
-
Target
launcher.bat
-
Size
86B
-
MD5
ff6177f24a11eaaa28c0a98fab30a4f5
-
SHA1
ba676bbe65a5bbce6ae0d853dd1436fce3d50a6f
-
SHA256
ab163a91b6577a3f14dfb859a20c06314673c87e5d6e1c11f4793eb741d05071
-
SHA512
d54b744cd38278ce3172e36db6dd15ed5e01588cb612bc43898ee53d1b24ee79706f30052b289c34c17d34508b1f0486164003bb78ea25ef8670dceb8b8da636
Malware Config
Signatures
-
Detects PikaBot botnet 6 IoCs
Processes:
resource yara_rule behavioral4/memory/2240-7-0x0000000000F60000-0x0000000000FB1000-memory.dmp family_pikabot_v2 behavioral4/memory/2240-9-0x0000000000F60000-0x0000000000FB1000-memory.dmp family_pikabot_v2 behavioral4/memory/2240-10-0x0000000000F60000-0x0000000000FB1000-memory.dmp family_pikabot_v2 behavioral4/memory/2240-12-0x0000000000F60000-0x0000000000FB1000-memory.dmp family_pikabot_v2 behavioral4/memory/2240-13-0x0000000000F60000-0x0000000000FB1000-memory.dmp family_pikabot_v2 behavioral4/memory/2240-16-0x0000000000F60000-0x0000000000FB1000-memory.dmp family_pikabot_v2 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 628 set thread context of 2240 628 rundll32.exe SearchProtocolHost.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exenetstat.exepid process 3360 ipconfig.exe 2256 netstat.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 3228 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
SearchProtocolHost.exepid process 2240 SearchProtocolHost.exe 2240 SearchProtocolHost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
rundll32.exepid process 628 rundll32.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
Processes:
rundll32.exepid process 628 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
Processes:
whoami.exenetstat.exedescription pid process Token: SeDebugPrivilege 3532 whoami.exe Token: SeDebugPrivilege 3532 whoami.exe Token: SeDebugPrivilege 3532 whoami.exe Token: SeDebugPrivilege 3532 whoami.exe Token: SeDebugPrivilege 3532 whoami.exe Token: SeDebugPrivilege 3532 whoami.exe Token: SeDebugPrivilege 3532 whoami.exe Token: SeDebugPrivilege 3532 whoami.exe Token: SeDebugPrivilege 3532 whoami.exe Token: SeDebugPrivilege 3532 whoami.exe Token: SeDebugPrivilege 3532 whoami.exe Token: SeDebugPrivilege 3532 whoami.exe Token: SeDebugPrivilege 3532 whoami.exe Token: SeDebugPrivilege 3532 whoami.exe Token: SeDebugPrivilege 3532 whoami.exe Token: SeDebugPrivilege 3532 whoami.exe Token: SeDebugPrivilege 3532 whoami.exe Token: SeDebugPrivilege 3532 whoami.exe Token: SeDebugPrivilege 3532 whoami.exe Token: SeDebugPrivilege 3532 whoami.exe Token: SeDebugPrivilege 3532 whoami.exe Token: SeDebugPrivilege 3532 whoami.exe Token: SeDebugPrivilege 3532 whoami.exe Token: SeDebugPrivilege 3532 whoami.exe Token: SeDebugPrivilege 3532 whoami.exe Token: SeDebugPrivilege 3532 whoami.exe Token: SeDebugPrivilege 3532 whoami.exe Token: SeDebugPrivilege 2256 netstat.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exerundll32.exerundll32.exedescription pid process target process PID 1204 wrote to memory of 4796 1204 cmd.exe rundll32.exe PID 1204 wrote to memory of 4796 1204 cmd.exe rundll32.exe PID 4796 wrote to memory of 628 4796 rundll32.exe rundll32.exe PID 4796 wrote to memory of 628 4796 rundll32.exe rundll32.exe PID 4796 wrote to memory of 628 4796 rundll32.exe rundll32.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe PID 628 wrote to memory of 2240 628 rundll32.exe SearchProtocolHost.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\launcher.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\AlmiqueArtilleryman_pkb2.dll, Throw2⤵
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\AlmiqueArtilleryman_pkb2.dll, Throw3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\SearchProtocolHost.exe"C:\Windows\System32\SearchProtocolHost.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
PID:2240 -
C:\Windows\SysWOW64\whoami.exewhoami.exe /all5⤵
- Suspicious use of AdjustPrivilegeToken
PID:3532
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig.exe /all5⤵
- Gathers network information
PID:3360
-
-
C:\Windows\SysWOW64\netstat.exenetstat.exe -aon5⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2188
-
C:\Windows\System32\NOTEPAD.EXE"C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\launcher.bat1⤵
- Opens file in notepad (likely ransom note)
PID:3228