Analysis
-
max time kernel
139s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 13:10
Static task
static1
Behavioral task
behavioral1
Sample
1986c381aa62399f7e9d0b78e220d251.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1986c381aa62399f7e9d0b78e220d251.exe
Resource
win10v2004-20231215-en
General
-
Target
1986c381aa62399f7e9d0b78e220d251.exe
-
Size
2.0MB
-
MD5
1986c381aa62399f7e9d0b78e220d251
-
SHA1
619700a00961904426b5ecae5b344f753315738d
-
SHA256
1972ef1673d32236f0c87e52ddab2d5472af789e6de1d70ccd22c4cdf4839e54
-
SHA512
f1b7baf0576aa873c59bd0dc2eac11d297b6c1d8b6080ca99dcff694338049f09ddb66970a55a327800cbb7855b25d5548d4669426732761bd81991d478d1f15
-
SSDEEP
49152:AYvMRWsoJqFYqKRd5AyM3xSa3jBSWC7NjPi9F+w:A9RYJqFYFxAbBSa3jAXj9w
Malware Config
Extracted
bitrat
1.38
89.248.173.187:5506
-
communication_password
fcea920f7412b5da7be0cf42b8c93759
-
install_dir
sazpclv
-
install_file
wmzr.exe
-
tor_process
tor
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
1986c381aa62399f7e9d0b78e220d251.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\wmzr = "C:\\Users\\Admin\\AppData\\Local\\sazpclv\\wmzr.exe" 1986c381aa62399f7e9d0b78e220d251.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
1986c381aa62399f7e9d0b78e220d251.exepid process 1540 1986c381aa62399f7e9d0b78e220d251.exe 1540 1986c381aa62399f7e9d0b78e220d251.exe 1540 1986c381aa62399f7e9d0b78e220d251.exe 1540 1986c381aa62399f7e9d0b78e220d251.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1986c381aa62399f7e9d0b78e220d251.exedescription pid process target process PID 2248 set thread context of 1540 2248 1986c381aa62399f7e9d0b78e220d251.exe 1986c381aa62399f7e9d0b78e220d251.exe -
Suspicious behavior: RenamesItself 28 IoCs
Processes:
1986c381aa62399f7e9d0b78e220d251.exepid process 1540 1986c381aa62399f7e9d0b78e220d251.exe 1540 1986c381aa62399f7e9d0b78e220d251.exe 1540 1986c381aa62399f7e9d0b78e220d251.exe 1540 1986c381aa62399f7e9d0b78e220d251.exe 1540 1986c381aa62399f7e9d0b78e220d251.exe 1540 1986c381aa62399f7e9d0b78e220d251.exe 1540 1986c381aa62399f7e9d0b78e220d251.exe 1540 1986c381aa62399f7e9d0b78e220d251.exe 1540 1986c381aa62399f7e9d0b78e220d251.exe 1540 1986c381aa62399f7e9d0b78e220d251.exe 1540 1986c381aa62399f7e9d0b78e220d251.exe 1540 1986c381aa62399f7e9d0b78e220d251.exe 1540 1986c381aa62399f7e9d0b78e220d251.exe 1540 1986c381aa62399f7e9d0b78e220d251.exe 1540 1986c381aa62399f7e9d0b78e220d251.exe 1540 1986c381aa62399f7e9d0b78e220d251.exe 1540 1986c381aa62399f7e9d0b78e220d251.exe 1540 1986c381aa62399f7e9d0b78e220d251.exe 1540 1986c381aa62399f7e9d0b78e220d251.exe 1540 1986c381aa62399f7e9d0b78e220d251.exe 1540 1986c381aa62399f7e9d0b78e220d251.exe 1540 1986c381aa62399f7e9d0b78e220d251.exe 1540 1986c381aa62399f7e9d0b78e220d251.exe 1540 1986c381aa62399f7e9d0b78e220d251.exe 1540 1986c381aa62399f7e9d0b78e220d251.exe 1540 1986c381aa62399f7e9d0b78e220d251.exe 1540 1986c381aa62399f7e9d0b78e220d251.exe 1540 1986c381aa62399f7e9d0b78e220d251.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
1986c381aa62399f7e9d0b78e220d251.exedescription pid process Token: SeDebugPrivilege 1540 1986c381aa62399f7e9d0b78e220d251.exe Token: SeShutdownPrivilege 1540 1986c381aa62399f7e9d0b78e220d251.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
1986c381aa62399f7e9d0b78e220d251.exepid process 1540 1986c381aa62399f7e9d0b78e220d251.exe 1540 1986c381aa62399f7e9d0b78e220d251.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
1986c381aa62399f7e9d0b78e220d251.exedescription pid process target process PID 2248 wrote to memory of 1540 2248 1986c381aa62399f7e9d0b78e220d251.exe 1986c381aa62399f7e9d0b78e220d251.exe PID 2248 wrote to memory of 1540 2248 1986c381aa62399f7e9d0b78e220d251.exe 1986c381aa62399f7e9d0b78e220d251.exe PID 2248 wrote to memory of 1540 2248 1986c381aa62399f7e9d0b78e220d251.exe 1986c381aa62399f7e9d0b78e220d251.exe PID 2248 wrote to memory of 1540 2248 1986c381aa62399f7e9d0b78e220d251.exe 1986c381aa62399f7e9d0b78e220d251.exe PID 2248 wrote to memory of 1540 2248 1986c381aa62399f7e9d0b78e220d251.exe 1986c381aa62399f7e9d0b78e220d251.exe PID 2248 wrote to memory of 1540 2248 1986c381aa62399f7e9d0b78e220d251.exe 1986c381aa62399f7e9d0b78e220d251.exe PID 2248 wrote to memory of 1540 2248 1986c381aa62399f7e9d0b78e220d251.exe 1986c381aa62399f7e9d0b78e220d251.exe PID 2248 wrote to memory of 1540 2248 1986c381aa62399f7e9d0b78e220d251.exe 1986c381aa62399f7e9d0b78e220d251.exe PID 2248 wrote to memory of 1540 2248 1986c381aa62399f7e9d0b78e220d251.exe 1986c381aa62399f7e9d0b78e220d251.exe PID 2248 wrote to memory of 1540 2248 1986c381aa62399f7e9d0b78e220d251.exe 1986c381aa62399f7e9d0b78e220d251.exe PID 2248 wrote to memory of 1540 2248 1986c381aa62399f7e9d0b78e220d251.exe 1986c381aa62399f7e9d0b78e220d251.exe PID 2248 wrote to memory of 1540 2248 1986c381aa62399f7e9d0b78e220d251.exe 1986c381aa62399f7e9d0b78e220d251.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1986c381aa62399f7e9d0b78e220d251.exe"C:\Users\Admin\AppData\Local\Temp\1986c381aa62399f7e9d0b78e220d251.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\1986c381aa62399f7e9d0b78e220d251.exe"C:\Users\Admin\AppData\Local\Temp\1986c381aa62399f7e9d0b78e220d251.exe"2⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1540-23-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1540-30-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1540-20-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1540-21-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1540-5-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1540-9-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1540-8-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1540-45-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1540-10-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1540-13-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1540-17-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1540-16-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1540-15-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1540-11-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1540-18-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1540-19-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1540-44-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1540-43-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1540-2-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/1540-24-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1540-25-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1540-26-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1540-27-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1540-28-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1540-31-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1540-41-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1540-32-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1540-35-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1540-36-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1540-37-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1540-39-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1540-40-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/2248-0-0x00000000047F0000-0x00000000049D4000-memory.dmpFilesize
1.9MB
-
memory/2248-4-0x00000000049E0000-0x0000000004DA5000-memory.dmpFilesize
3.8MB
-
memory/2248-1-0x00000000047F0000-0x00000000049D4000-memory.dmpFilesize
1.9MB
-
memory/2248-7-0x00000000047F0000-0x00000000049D4000-memory.dmpFilesize
1.9MB