Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2023 00:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3501e786be4bd0373ffb6c26400aa5b8.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
3501e786be4bd0373ffb6c26400aa5b8.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
3501e786be4bd0373ffb6c26400aa5b8.exe
-
Size
4.3MB
-
MD5
3501e786be4bd0373ffb6c26400aa5b8
-
SHA1
1abb20babb5f280a0896f9a63b9c30e65149c8ac
-
SHA256
4420228e7fcc165d098da14380b8f81027d7a8b061828cafcfaf66b495821c98
-
SHA512
455eaaa5cb0d21662eb645e039465080e1312438b63400a36010e41a8ec29990914d88ec9043561d87fbdfcff2199b9ee5844f30ea362849f2b640b1f73f1049
-
SSDEEP
98304:lgv1yLNN5DwMZCEwEQhTYPL6iezQhNQOzhNgqEmYDpPj:lgcBPL/wzhTY8zQh/hNgqfYN
Score
10/10
Malware Config
Extracted
Family
bitrat
Version
1.38
C2
185.157.160.147:1975
Attributes
-
communication_password
f49a6667c09a9e329afb64bc0a18a188
-
tor_process
tor
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am = "C:\\Users\\Admin\\AppData\\Roaming\\aw\\ar.exe" 3501e786be4bd0373ffb6c26400aa5b8.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1144 3501e786be4bd0373ffb6c26400aa5b8.exe 1144 3501e786be4bd0373ffb6c26400aa5b8.exe 1144 3501e786be4bd0373ffb6c26400aa5b8.exe 1144 3501e786be4bd0373ffb6c26400aa5b8.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 976 set thread context of 1144 976 3501e786be4bd0373ffb6c26400aa5b8.exe 21 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1144 3501e786be4bd0373ffb6c26400aa5b8.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 976 3501e786be4bd0373ffb6c26400aa5b8.exe 1144 3501e786be4bd0373ffb6c26400aa5b8.exe 1144 3501e786be4bd0373ffb6c26400aa5b8.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 976 wrote to memory of 1144 976 3501e786be4bd0373ffb6c26400aa5b8.exe 21 PID 976 wrote to memory of 1144 976 3501e786be4bd0373ffb6c26400aa5b8.exe 21 PID 976 wrote to memory of 1144 976 3501e786be4bd0373ffb6c26400aa5b8.exe 21 PID 976 wrote to memory of 1144 976 3501e786be4bd0373ffb6c26400aa5b8.exe 21 PID 976 wrote to memory of 1144 976 3501e786be4bd0373ffb6c26400aa5b8.exe 21 PID 976 wrote to memory of 1144 976 3501e786be4bd0373ffb6c26400aa5b8.exe 21 PID 976 wrote to memory of 1144 976 3501e786be4bd0373ffb6c26400aa5b8.exe 21 PID 976 wrote to memory of 1144 976 3501e786be4bd0373ffb6c26400aa5b8.exe 21 PID 976 wrote to memory of 1144 976 3501e786be4bd0373ffb6c26400aa5b8.exe 21 PID 976 wrote to memory of 1144 976 3501e786be4bd0373ffb6c26400aa5b8.exe 21 PID 976 wrote to memory of 1144 976 3501e786be4bd0373ffb6c26400aa5b8.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\3501e786be4bd0373ffb6c26400aa5b8.exe"C:\Users\Admin\AppData\Local\Temp\3501e786be4bd0373ffb6c26400aa5b8.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\AppData\Local\Temp\3501e786be4bd0373ffb6c26400aa5b8.exe"C:\Users\Admin\AppData\Local\Temp\3501e786be4bd0373ffb6c26400aa5b8.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1144
-