Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 00:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3501e786be4bd0373ffb6c26400aa5b8.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
3501e786be4bd0373ffb6c26400aa5b8.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
3501e786be4bd0373ffb6c26400aa5b8.exe
-
Size
4.3MB
-
MD5
3501e786be4bd0373ffb6c26400aa5b8
-
SHA1
1abb20babb5f280a0896f9a63b9c30e65149c8ac
-
SHA256
4420228e7fcc165d098da14380b8f81027d7a8b061828cafcfaf66b495821c98
-
SHA512
455eaaa5cb0d21662eb645e039465080e1312438b63400a36010e41a8ec29990914d88ec9043561d87fbdfcff2199b9ee5844f30ea362849f2b640b1f73f1049
-
SSDEEP
98304:lgv1yLNN5DwMZCEwEQhTYPL6iezQhNQOzhNgqEmYDpPj:lgcBPL/wzhTY8zQh/hNgqfYN
Score
10/10
Malware Config
Extracted
Family
bitrat
Version
1.38
C2
185.157.160.147:1975
Attributes
-
communication_password
f49a6667c09a9e329afb64bc0a18a188
-
tor_process
tor
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\am = "C:\\Users\\Admin\\AppData\\Roaming\\aw\\ar.exe" 3501e786be4bd0373ffb6c26400aa5b8.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2900 3501e786be4bd0373ffb6c26400aa5b8.exe 2900 3501e786be4bd0373ffb6c26400aa5b8.exe 2900 3501e786be4bd0373ffb6c26400aa5b8.exe 2900 3501e786be4bd0373ffb6c26400aa5b8.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2192 set thread context of 2900 2192 3501e786be4bd0373ffb6c26400aa5b8.exe 28 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2900 3501e786be4bd0373ffb6c26400aa5b8.exe Token: SeShutdownPrivilege 2900 3501e786be4bd0373ffb6c26400aa5b8.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2192 3501e786be4bd0373ffb6c26400aa5b8.exe 2900 3501e786be4bd0373ffb6c26400aa5b8.exe 2900 3501e786be4bd0373ffb6c26400aa5b8.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2900 2192 3501e786be4bd0373ffb6c26400aa5b8.exe 28 PID 2192 wrote to memory of 2900 2192 3501e786be4bd0373ffb6c26400aa5b8.exe 28 PID 2192 wrote to memory of 2900 2192 3501e786be4bd0373ffb6c26400aa5b8.exe 28 PID 2192 wrote to memory of 2900 2192 3501e786be4bd0373ffb6c26400aa5b8.exe 28 PID 2192 wrote to memory of 2900 2192 3501e786be4bd0373ffb6c26400aa5b8.exe 28 PID 2192 wrote to memory of 2900 2192 3501e786be4bd0373ffb6c26400aa5b8.exe 28 PID 2192 wrote to memory of 2900 2192 3501e786be4bd0373ffb6c26400aa5b8.exe 28 PID 2192 wrote to memory of 2900 2192 3501e786be4bd0373ffb6c26400aa5b8.exe 28 PID 2192 wrote to memory of 2900 2192 3501e786be4bd0373ffb6c26400aa5b8.exe 28 PID 2192 wrote to memory of 2900 2192 3501e786be4bd0373ffb6c26400aa5b8.exe 28 PID 2192 wrote to memory of 2900 2192 3501e786be4bd0373ffb6c26400aa5b8.exe 28 PID 2192 wrote to memory of 2900 2192 3501e786be4bd0373ffb6c26400aa5b8.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3501e786be4bd0373ffb6c26400aa5b8.exe"C:\Users\Admin\AppData\Local\Temp\3501e786be4bd0373ffb6c26400aa5b8.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\3501e786be4bd0373ffb6c26400aa5b8.exe"C:\Users\Admin\AppData\Local\Temp\3501e786be4bd0373ffb6c26400aa5b8.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2900
-