Analysis
-
max time kernel
150s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 13:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1986c381aa62399f7e9d0b78e220d251.exe
Resource
win7-20231215-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
1986c381aa62399f7e9d0b78e220d251.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
8 signatures
150 seconds
General
-
Target
1986c381aa62399f7e9d0b78e220d251.exe
-
Size
2.0MB
-
MD5
1986c381aa62399f7e9d0b78e220d251
-
SHA1
619700a00961904426b5ecae5b344f753315738d
-
SHA256
1972ef1673d32236f0c87e52ddab2d5472af789e6de1d70ccd22c4cdf4839e54
-
SHA512
f1b7baf0576aa873c59bd0dc2eac11d297b6c1d8b6080ca99dcff694338049f09ddb66970a55a327800cbb7855b25d5548d4669426732761bd81991d478d1f15
-
SSDEEP
49152:AYvMRWsoJqFYqKRd5AyM3xSa3jBSWC7NjPi9F+w:A9RYJqFYFxAbBSa3jAXj9w
Score
10/10
Malware Config
Extracted
Family
bitrat
Version
1.38
C2
89.248.173.187:5506
Attributes
-
communication_password
fcea920f7412b5da7be0cf42b8c93759
-
install_dir
sazpclv
-
install_file
wmzr.exe
-
tor_process
tor
Signatures
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wmzr = "C:\\Users\\Admin\\AppData\\Local\\sazpclv\\wmzr.exe" 1986c381aa62399f7e9d0b78e220d251.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wmzr = "C:\\Users\\Admin\\AppData\\Local\\sazpclv\\wmzr.exeԀ" 1986c381aa62399f7e9d0b78e220d251.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wmzr = "C:\\Users\\Admin\\AppData\\Local\\sazpclv\\wmzr.exe瘀" 1986c381aa62399f7e9d0b78e220d251.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4988 1986c381aa62399f7e9d0b78e220d251.exe 4988 1986c381aa62399f7e9d0b78e220d251.exe 4988 1986c381aa62399f7e9d0b78e220d251.exe 4988 1986c381aa62399f7e9d0b78e220d251.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3584 set thread context of 4988 3584 1986c381aa62399f7e9d0b78e220d251.exe 90 -
Suspicious behavior: RenamesItself 29 IoCs
pid Process 4988 1986c381aa62399f7e9d0b78e220d251.exe 4988 1986c381aa62399f7e9d0b78e220d251.exe 4988 1986c381aa62399f7e9d0b78e220d251.exe 4988 1986c381aa62399f7e9d0b78e220d251.exe 4988 1986c381aa62399f7e9d0b78e220d251.exe 4988 1986c381aa62399f7e9d0b78e220d251.exe 4988 1986c381aa62399f7e9d0b78e220d251.exe 4988 1986c381aa62399f7e9d0b78e220d251.exe 4988 1986c381aa62399f7e9d0b78e220d251.exe 4988 1986c381aa62399f7e9d0b78e220d251.exe 4988 1986c381aa62399f7e9d0b78e220d251.exe 4988 1986c381aa62399f7e9d0b78e220d251.exe 4988 1986c381aa62399f7e9d0b78e220d251.exe 4988 1986c381aa62399f7e9d0b78e220d251.exe 4988 1986c381aa62399f7e9d0b78e220d251.exe 4988 1986c381aa62399f7e9d0b78e220d251.exe 4988 1986c381aa62399f7e9d0b78e220d251.exe 4988 1986c381aa62399f7e9d0b78e220d251.exe 4988 1986c381aa62399f7e9d0b78e220d251.exe 4988 1986c381aa62399f7e9d0b78e220d251.exe 4988 1986c381aa62399f7e9d0b78e220d251.exe 4988 1986c381aa62399f7e9d0b78e220d251.exe 4988 1986c381aa62399f7e9d0b78e220d251.exe 4988 1986c381aa62399f7e9d0b78e220d251.exe 4988 1986c381aa62399f7e9d0b78e220d251.exe 4988 1986c381aa62399f7e9d0b78e220d251.exe 4988 1986c381aa62399f7e9d0b78e220d251.exe 4988 1986c381aa62399f7e9d0b78e220d251.exe 4988 1986c381aa62399f7e9d0b78e220d251.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 4988 1986c381aa62399f7e9d0b78e220d251.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4988 1986c381aa62399f7e9d0b78e220d251.exe 4988 1986c381aa62399f7e9d0b78e220d251.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3584 wrote to memory of 4988 3584 1986c381aa62399f7e9d0b78e220d251.exe 90 PID 3584 wrote to memory of 4988 3584 1986c381aa62399f7e9d0b78e220d251.exe 90 PID 3584 wrote to memory of 4988 3584 1986c381aa62399f7e9d0b78e220d251.exe 90 PID 3584 wrote to memory of 4988 3584 1986c381aa62399f7e9d0b78e220d251.exe 90 PID 3584 wrote to memory of 4988 3584 1986c381aa62399f7e9d0b78e220d251.exe 90 PID 3584 wrote to memory of 4988 3584 1986c381aa62399f7e9d0b78e220d251.exe 90 PID 3584 wrote to memory of 4988 3584 1986c381aa62399f7e9d0b78e220d251.exe 90 PID 3584 wrote to memory of 4988 3584 1986c381aa62399f7e9d0b78e220d251.exe 90 PID 3584 wrote to memory of 4988 3584 1986c381aa62399f7e9d0b78e220d251.exe 90 PID 3584 wrote to memory of 4988 3584 1986c381aa62399f7e9d0b78e220d251.exe 90 PID 3584 wrote to memory of 4988 3584 1986c381aa62399f7e9d0b78e220d251.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\1986c381aa62399f7e9d0b78e220d251.exe"C:\Users\Admin\AppData\Local\Temp\1986c381aa62399f7e9d0b78e220d251.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\1986c381aa62399f7e9d0b78e220d251.exe"C:\Users\Admin\AppData\Local\Temp\1986c381aa62399f7e9d0b78e220d251.exe"2⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4988
-