Analysis
-
max time kernel
261s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
submitted
11-01-2024 00:05
Static task
static1
1 signatures
General
Malware Config
Extracted
Family
pikabot
C2
192.248.174.52:5631
109.123.227.104:2221
65.20.98.24:13783
154.38.184.3:2223
155.138.203.158:1194
210.243.8.247:23399
139.180.185.171:2222
154.221.30.136:13724
65.20.82.254:5243
Signatures
-
Detects PikaBot botnet 6 IoCs
resource yara_rule behavioral1/memory/1896-0-0x00000000001B0000-0x00000000001FF000-memory.dmp family_pikabot_v2 behavioral1/memory/1896-1-0x00000000001B0000-0x00000000001FF000-memory.dmp family_pikabot_v2 behavioral1/memory/1896-2-0x00000000001B0000-0x00000000001FF000-memory.dmp family_pikabot_v2 behavioral1/memory/1896-5-0x00000000001B0000-0x00000000001FF000-memory.dmp family_pikabot_v2 behavioral1/memory/1896-16-0x00000000001B0000-0x00000000001FF000-memory.dmp family_pikabot_v2 behavioral1/memory/1896-18-0x00000000001B0000-0x00000000001FF000-memory.dmp family_pikabot_v2 -
Pikabot family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2788 set thread context of 1896 2788 rundll32.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SearchProtocolHost.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1199853020-417986905-91977573-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 244 vlc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1896 SearchProtocolHost.exe 1896 SearchProtocolHost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 244 vlc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
pid Process 2788 rundll32.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 244 vlc.exe 244 vlc.exe 244 vlc.exe 244 vlc.exe 244 vlc.exe 244 vlc.exe 244 vlc.exe 244 vlc.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 244 vlc.exe 244 vlc.exe 244 vlc.exe 244 vlc.exe 244 vlc.exe 244 vlc.exe 244 vlc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1056 MiniSearchHost.exe 244 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1360 wrote to memory of 2788 1360 rundll32.exe 80 PID 1360 wrote to memory of 2788 1360 rundll32.exe 80 PID 1360 wrote to memory of 2788 1360 rundll32.exe 80 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81 PID 2788 wrote to memory of 1896 2788 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e1179516c0fe8cbf69566d5db63c6d1d7d02d67b04eae5800f9a950fb07fee81.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e1179516c0fe8cbf69566d5db63c6d1d7d02d67b04eae5800f9a950fb07fee81.dll,#12⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\SearchProtocolHost.exe"C:\Windows\System32\SearchProtocolHost.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1896
-
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1056
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4716
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\GrantSave.asx"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:244
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\GrantSave.asx"1⤵PID:3172