Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 00:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
20f3df7ea13bed206455d6718901f1cd.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
20f3df7ea13bed206455d6718901f1cd.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
20f3df7ea13bed206455d6718901f1cd.exe
-
Size
296KB
-
MD5
20f3df7ea13bed206455d6718901f1cd
-
SHA1
b1841019f357f5da346b327c4c04dbf98a548907
-
SHA256
daf043d3bb739d61cd313a6a48d18cdfcfe879975290009c2697d5b8287da96a
-
SHA512
85b3d1d58fdc6a0d97399728d47d36517ba1c302dfbc63c3eef37137da032371f89cea208e4d6853dd03edb53ff34dcfe5cd9f8eb0b4b327b4f9fe8d492ebe26
-
SSDEEP
3072:FpvX0e1FB/DpKjCLHM1sAUiqoC2GV4U+IJ/RyK1:LiQ2/4J/R3
Score
8/10
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9D71D88C-C598-4935-C5D1-43AA4DB90836} 20f3df7ea13bed206455d6718901f1cd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9D71D88C-C598-4935-C5D1-43AA4DB90836}\stubpath = "C:\\Program Files (x86)\\Bifrost\\server.exe s" 20f3df7ea13bed206455d6718901f1cd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1712 set thread context of 3944 1712 20f3df7ea13bed206455d6718901f1cd.exe 21 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Bifrost\server.exe 20f3df7ea13bed206455d6718901f1cd.exe File created C:\Program Files (x86)\Bifrost\server.exe 20f3df7ea13bed206455d6718901f1cd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3944 20f3df7ea13bed206455d6718901f1cd.exe Token: SeDebugPrivilege 3944 20f3df7ea13bed206455d6718901f1cd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1712 20f3df7ea13bed206455d6718901f1cd.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1712 wrote to memory of 3944 1712 20f3df7ea13bed206455d6718901f1cd.exe 21 PID 1712 wrote to memory of 3944 1712 20f3df7ea13bed206455d6718901f1cd.exe 21 PID 1712 wrote to memory of 3944 1712 20f3df7ea13bed206455d6718901f1cd.exe 21 PID 1712 wrote to memory of 3944 1712 20f3df7ea13bed206455d6718901f1cd.exe 21 PID 1712 wrote to memory of 3944 1712 20f3df7ea13bed206455d6718901f1cd.exe 21 PID 1712 wrote to memory of 3944 1712 20f3df7ea13bed206455d6718901f1cd.exe 21 PID 1712 wrote to memory of 3944 1712 20f3df7ea13bed206455d6718901f1cd.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\20f3df7ea13bed206455d6718901f1cd.exe"C:\Users\Admin\AppData\Local\Temp\20f3df7ea13bed206455d6718901f1cd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\20f3df7ea13bed206455d6718901f1cd.exeC:\Users\Admin\AppData\Local\Temp\20f3df7ea13bed206455d6718901f1cd.exe2⤵
- Modifies Installed Components in the registry
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:3944
-