Analysis
-
max time kernel
198s -
max time network
219s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28-12-2023 06:18
Static task
static1
Behavioral task
behavioral1
Sample
cb1210c9515e3e6bf5716048cb7ba3cf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
cb1210c9515e3e6bf5716048cb7ba3cf.exe
Resource
win10v2004-20231215-en
General
-
Target
cb1210c9515e3e6bf5716048cb7ba3cf.exe
-
Size
2.1MB
-
MD5
cb1210c9515e3e6bf5716048cb7ba3cf
-
SHA1
9a57f751a71a63ac9b998a6a19b7a38b96349e53
-
SHA256
42c77364cebcb01102a85a8bb9a053a0e01d633c2e9710256e9d174a9f67effd
-
SHA512
ee6ca757e4dec2230255c26f66dfb20e225e22581e3c90359f168e976a5e12250ed24dd5305b6c59a673036841cedce682601fef5f4c9304843571c941c96990
-
SSDEEP
49152:1kIxSRHorTDMyDmFscevbcd/Fkl1DI8wGLSK4Erm8jJE3hGJGYRV6O37PckR1h:1k8SeDMbFs3Ad/FUIyHpcMhn1370kR1
Malware Config
Extracted
bitrat
1.38
gotti.ddnsgeek.com:8088
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
tor_process
tor
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "\"C:\\Users\\Admin\\AppData\\Roaming\\oiqjWh2890agfhgW\\Ux3JQeGsFGk2.exe\",explorer.exe" cb1210c9515e3e6bf5716048cb7ba3cf.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4508 vbc.exe 4508 vbc.exe 4508 vbc.exe 4508 vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 932 set thread context of 4508 932 cb1210c9515e3e6bf5716048cb7ba3cf.exe 99 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 932 cb1210c9515e3e6bf5716048cb7ba3cf.exe 932 cb1210c9515e3e6bf5716048cb7ba3cf.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 932 cb1210c9515e3e6bf5716048cb7ba3cf.exe Token: SeDebugPrivilege 932 cb1210c9515e3e6bf5716048cb7ba3cf.exe Token: SeShutdownPrivilege 4508 vbc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4508 vbc.exe 4508 vbc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 932 wrote to memory of 4508 932 cb1210c9515e3e6bf5716048cb7ba3cf.exe 99 PID 932 wrote to memory of 4508 932 cb1210c9515e3e6bf5716048cb7ba3cf.exe 99 PID 932 wrote to memory of 4508 932 cb1210c9515e3e6bf5716048cb7ba3cf.exe 99 PID 932 wrote to memory of 4508 932 cb1210c9515e3e6bf5716048cb7ba3cf.exe 99 PID 932 wrote to memory of 4508 932 cb1210c9515e3e6bf5716048cb7ba3cf.exe 99 PID 932 wrote to memory of 4508 932 cb1210c9515e3e6bf5716048cb7ba3cf.exe 99 PID 932 wrote to memory of 4508 932 cb1210c9515e3e6bf5716048cb7ba3cf.exe 99 PID 932 wrote to memory of 4508 932 cb1210c9515e3e6bf5716048cb7ba3cf.exe 99 PID 932 wrote to memory of 4508 932 cb1210c9515e3e6bf5716048cb7ba3cf.exe 99 PID 932 wrote to memory of 4508 932 cb1210c9515e3e6bf5716048cb7ba3cf.exe 99 PID 932 wrote to memory of 4508 932 cb1210c9515e3e6bf5716048cb7ba3cf.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb1210c9515e3e6bf5716048cb7ba3cf.exe"C:\Users\Admin\AppData\Local\Temp\cb1210c9515e3e6bf5716048cb7ba3cf.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4508
-