Analysis
-
max time kernel
128s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 17:09
Static task
static1
Behavioral task
behavioral1
Sample
7f33bacbd78bf143a1f8a52b1f8b4cde.exe
Resource
win7-20231215-en
General
-
Target
7f33bacbd78bf143a1f8a52b1f8b4cde.exe
-
Size
3.2MB
-
MD5
7f33bacbd78bf143a1f8a52b1f8b4cde
-
SHA1
97ce3f3084b8db04be526422bf9a1feb0d476e25
-
SHA256
03957e1a76e380308206465031a99a1db9e7afce4b82e021f0f8f94888b791b2
-
SHA512
c4dd06b99cbe62a1eb3119bdbfac096f9e54328873d8b26b7139ecd89b9ad51c83d97afed519fb81ff9b94fe2df3cbb3c746cec8ed2722af797c4a03d8e5ea08
-
SSDEEP
98304:TKC6+yhQD2OYZGQRticLcM1cVr9D0mDpg84G:+CpYQClrRIcLcMir9DrDp
Malware Config
Extracted
bitrat
1.38
snkno.duckdns.org:43413
-
communication_password
827ccb0eea8a706c4c34a16891f84e7b
-
tor_process
tor
Signatures
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral2/memory/1880-7-0x0000000004F00000-0x0000000004F12000-memory.dmp CustAttr -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 7f33bacbd78bf143a1f8a52b1f8b4cde.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2400 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 2400 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 2400 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 2400 7f33bacbd78bf143a1f8a52b1f8b4cde.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1880 set thread context of 2400 1880 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 106 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3608 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2400 7f33bacbd78bf143a1f8a52b1f8b4cde.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2400 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 2400 7f33bacbd78bf143a1f8a52b1f8b4cde.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1880 wrote to memory of 3608 1880 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 107 PID 1880 wrote to memory of 3608 1880 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 107 PID 1880 wrote to memory of 3608 1880 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 107 PID 1880 wrote to memory of 2400 1880 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 106 PID 1880 wrote to memory of 2400 1880 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 106 PID 1880 wrote to memory of 2400 1880 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 106 PID 1880 wrote to memory of 2400 1880 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 106 PID 1880 wrote to memory of 2400 1880 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 106 PID 1880 wrote to memory of 2400 1880 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 106 PID 1880 wrote to memory of 2400 1880 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 106 PID 1880 wrote to memory of 2400 1880 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 106 PID 1880 wrote to memory of 2400 1880 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 106 PID 1880 wrote to memory of 2400 1880 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 106 PID 1880 wrote to memory of 2400 1880 7f33bacbd78bf143a1f8a52b1f8b4cde.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f33bacbd78bf143a1f8a52b1f8b4cde.exe"C:\Users\Admin\AppData\Local\Temp\7f33bacbd78bf143a1f8a52b1f8b4cde.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\7f33bacbd78bf143a1f8a52b1f8b4cde.exe"C:\Users\Admin\AppData\Local\Temp\7f33bacbd78bf143a1f8a52b1f8b4cde.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2400
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WZTuVE" /XML "C:\Users\Admin\AppData\Local\Temp\tmp12B8.tmp"2⤵
- Creates scheduled task(s)
PID:3608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5604c9c669ee48d9f355ad700e119f969
SHA1219094b9cbc3843485e664537e928c209f23f15c
SHA256407e546b7434ad9c81c3b8cbed54083852f4ba5332a65db6b854e9bef3f00602
SHA512ebaf356784aa70b48f4026b3813b26c6f5dd7cd57ca51d82e87571446070826ec602cb267e6cba79617a200b7ee192d23f706da91757b0a4e81fb423eb3d83fc