Analysis
-
max time kernel
148s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 17:09
Static task
static1
Behavioral task
behavioral1
Sample
7f33bacbd78bf143a1f8a52b1f8b4cde.exe
Resource
win7-20231215-en
General
-
Target
7f33bacbd78bf143a1f8a52b1f8b4cde.exe
-
Size
3.2MB
-
MD5
7f33bacbd78bf143a1f8a52b1f8b4cde
-
SHA1
97ce3f3084b8db04be526422bf9a1feb0d476e25
-
SHA256
03957e1a76e380308206465031a99a1db9e7afce4b82e021f0f8f94888b791b2
-
SHA512
c4dd06b99cbe62a1eb3119bdbfac096f9e54328873d8b26b7139ecd89b9ad51c83d97afed519fb81ff9b94fe2df3cbb3c746cec8ed2722af797c4a03d8e5ea08
-
SSDEEP
98304:TKC6+yhQD2OYZGQRticLcM1cVr9D0mDpg84G:+CpYQClrRIcLcMir9DrDp
Malware Config
Extracted
bitrat
1.38
snkno.duckdns.org:43413
-
communication_password
827ccb0eea8a706c4c34a16891f84e7b
-
tor_process
tor
Signatures
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral1/memory/2908-3-0x00000000002D0000-0x00000000002E2000-memory.dmp CustAttr -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2164 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 2164 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 2164 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 2164 7f33bacbd78bf143a1f8a52b1f8b4cde.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2908 set thread context of 2164 2908 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 520 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2164 7f33bacbd78bf143a1f8a52b1f8b4cde.exe Token: SeShutdownPrivilege 2164 7f33bacbd78bf143a1f8a52b1f8b4cde.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2164 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 2164 7f33bacbd78bf143a1f8a52b1f8b4cde.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2908 wrote to memory of 520 2908 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 30 PID 2908 wrote to memory of 520 2908 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 30 PID 2908 wrote to memory of 520 2908 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 30 PID 2908 wrote to memory of 520 2908 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 30 PID 2908 wrote to memory of 2164 2908 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 32 PID 2908 wrote to memory of 2164 2908 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 32 PID 2908 wrote to memory of 2164 2908 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 32 PID 2908 wrote to memory of 2164 2908 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 32 PID 2908 wrote to memory of 2164 2908 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 32 PID 2908 wrote to memory of 2164 2908 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 32 PID 2908 wrote to memory of 2164 2908 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 32 PID 2908 wrote to memory of 2164 2908 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 32 PID 2908 wrote to memory of 2164 2908 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 32 PID 2908 wrote to memory of 2164 2908 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 32 PID 2908 wrote to memory of 2164 2908 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 32 PID 2908 wrote to memory of 2164 2908 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f33bacbd78bf143a1f8a52b1f8b4cde.exe"C:\Users\Admin\AppData\Local\Temp\7f33bacbd78bf143a1f8a52b1f8b4cde.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WZTuVE" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2D38.tmp"2⤵
- Creates scheduled task(s)
PID:520
-
-
C:\Users\Admin\AppData\Local\Temp\7f33bacbd78bf143a1f8a52b1f8b4cde.exe"C:\Users\Admin\AppData\Local\Temp\7f33bacbd78bf143a1f8a52b1f8b4cde.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5fe54d2b55c7e2cd0a3bbc663097fdbd6
SHA1ce300409bd60e6192d637812fa028ae2a3b157a7
SHA256cae3dcd4f38536a5ea8e3ba004162f9f309b8e434af48e08f865c93bedd7bbfd
SHA5123f08887cd73c3a3c3844e54549a7382ee9777870e2051311e1a1ae44dfccd3b2696794ac04f1a3f9bef68a85765b9b2fb32ca9960277454acfebc7d4a380f5fc