Analysis
-
max time kernel
33s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 20:36
Static task
static1
Behavioral task
behavioral1
Sample
1bf1d6e8ef16cccf201173d11aafe00e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1bf1d6e8ef16cccf201173d11aafe00e.exe
Resource
win10v2004-20231215-en
General
-
Target
1bf1d6e8ef16cccf201173d11aafe00e.exe
-
Size
2.6MB
-
MD5
1bf1d6e8ef16cccf201173d11aafe00e
-
SHA1
ff3866b22e80acdf4175a1f496422c4736148bb0
-
SHA256
f5481cd3d77f9e73b0e1a2425bf32886d2ff78f872a278b3b2dc0b00a35d1e95
-
SHA512
07455146ba16e66b2b32af996ca51983354dcdcc8a26dd5b33a26f4c4c18a0f660c016e44de129222e912b28fb14ff239b0823eb62f360c80477ce1659788c42
-
SSDEEP
49152:p+8EoyPJJFc4sIe7yAsxjTNwquM4e04xvbjATC2z+v2:p6PnFc4szuRHYN4J2zt
Malware Config
Extracted
bitrat
1.38
dns16-microsoft-health.com:80
-
communication_password
1fb84c2caca11d084aafca61f7284a70
-
install_dir
Intel
-
install_file
idrvr32.exe
-
tor_process
tor
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\idrvr32 = "C:\\Users\\Admin\\AppData\\Local\\Intel\\idrvr32.exe" 1bf1d6e8ef16cccf201173d11aafe00e.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 2404 1bf1d6e8ef16cccf201173d11aafe00e.exe 2404 1bf1d6e8ef16cccf201173d11aafe00e.exe 2404 1bf1d6e8ef16cccf201173d11aafe00e.exe 2404 1bf1d6e8ef16cccf201173d11aafe00e.exe 2404 1bf1d6e8ef16cccf201173d11aafe00e.exe 2404 1bf1d6e8ef16cccf201173d11aafe00e.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2512 set thread context of 2404 2512 1bf1d6e8ef16cccf201173d11aafe00e.exe 26 -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2512 1bf1d6e8ef16cccf201173d11aafe00e.exe -
Suspicious behavior: RenamesItself 7 IoCs
pid Process 2404 1bf1d6e8ef16cccf201173d11aafe00e.exe 2404 1bf1d6e8ef16cccf201173d11aafe00e.exe 2404 1bf1d6e8ef16cccf201173d11aafe00e.exe 2404 1bf1d6e8ef16cccf201173d11aafe00e.exe 2404 1bf1d6e8ef16cccf201173d11aafe00e.exe 2404 1bf1d6e8ef16cccf201173d11aafe00e.exe 2404 1bf1d6e8ef16cccf201173d11aafe00e.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2404 1bf1d6e8ef16cccf201173d11aafe00e.exe Token: SeShutdownPrivilege 2404 1bf1d6e8ef16cccf201173d11aafe00e.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2512 1bf1d6e8ef16cccf201173d11aafe00e.exe 2404 1bf1d6e8ef16cccf201173d11aafe00e.exe 2404 1bf1d6e8ef16cccf201173d11aafe00e.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2404 2512 1bf1d6e8ef16cccf201173d11aafe00e.exe 26 PID 2512 wrote to memory of 2404 2512 1bf1d6e8ef16cccf201173d11aafe00e.exe 26 PID 2512 wrote to memory of 2404 2512 1bf1d6e8ef16cccf201173d11aafe00e.exe 26 PID 2512 wrote to memory of 2404 2512 1bf1d6e8ef16cccf201173d11aafe00e.exe 26 PID 2512 wrote to memory of 2404 2512 1bf1d6e8ef16cccf201173d11aafe00e.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bf1d6e8ef16cccf201173d11aafe00e.exe"C:\Users\Admin\AppData\Local\Temp\1bf1d6e8ef16cccf201173d11aafe00e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\1bf1d6e8ef16cccf201173d11aafe00e.exe"C:\Users\Admin\AppData\Local\Temp\1bf1d6e8ef16cccf201173d11aafe00e.exe"2⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2404
-