Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-02-2024 07:52
Behavioral task
behavioral1
Sample
a155acff10e4cbb90591962276dd7e59.exe
Resource
win7-20240221-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
a155acff10e4cbb90591962276dd7e59.exe
Resource
win10v2004-20240221-en
7 signatures
150 seconds
General
-
Target
a155acff10e4cbb90591962276dd7e59.exe
-
Size
1.4MB
-
MD5
a155acff10e4cbb90591962276dd7e59
-
SHA1
c32b9b5352b0058cf0a457af077b8c0e26367080
-
SHA256
9f170357a947a0db05e2b9a8d558e942efe7d8e61c56cf4246f92b5ff95e3a84
-
SHA512
1791ddfff1630efc24b22db2309756d627a6dd228e9d2be5853be736d4af39f4bebc3afaee1b86a0c406af7ccc9dddac713b452c98637160e8aff0c9898cf4a3
-
SSDEEP
24576:XndRKZCy2BrhCeU2i2cJijFbCBTPmiY05tJMSQp5ysA7Yg1nLkz1BKQHr9RjB:3XDFBU2iIBb0xY/6sUYYcBBZR
Score
10/10
Malware Config
Extracted
Family
bitrat
Version
1.38
C2
pvstub.ddns.net:43763
Attributes
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
install_dir
MSCrypt
-
install_file
brclient2.exe
-
tor_process
tor
Signatures
-
resource yara_rule behavioral1/memory/3000-0-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/3000-3-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\brclient2 = "C:\\Users\\Admin\\AppData\\Local\\MSCrypt\\brclient2.exe" a155acff10e4cbb90591962276dd7e59.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 3000 a155acff10e4cbb90591962276dd7e59.exe 3000 a155acff10e4cbb90591962276dd7e59.exe 3000 a155acff10e4cbb90591962276dd7e59.exe 3000 a155acff10e4cbb90591962276dd7e59.exe 3000 a155acff10e4cbb90591962276dd7e59.exe -
Suspicious behavior: RenamesItself 30 IoCs
pid Process 3000 a155acff10e4cbb90591962276dd7e59.exe 3000 a155acff10e4cbb90591962276dd7e59.exe 3000 a155acff10e4cbb90591962276dd7e59.exe 3000 a155acff10e4cbb90591962276dd7e59.exe 3000 a155acff10e4cbb90591962276dd7e59.exe 3000 a155acff10e4cbb90591962276dd7e59.exe 3000 a155acff10e4cbb90591962276dd7e59.exe 3000 a155acff10e4cbb90591962276dd7e59.exe 3000 a155acff10e4cbb90591962276dd7e59.exe 3000 a155acff10e4cbb90591962276dd7e59.exe 3000 a155acff10e4cbb90591962276dd7e59.exe 3000 a155acff10e4cbb90591962276dd7e59.exe 3000 a155acff10e4cbb90591962276dd7e59.exe 3000 a155acff10e4cbb90591962276dd7e59.exe 3000 a155acff10e4cbb90591962276dd7e59.exe 3000 a155acff10e4cbb90591962276dd7e59.exe 3000 a155acff10e4cbb90591962276dd7e59.exe 3000 a155acff10e4cbb90591962276dd7e59.exe 3000 a155acff10e4cbb90591962276dd7e59.exe 3000 a155acff10e4cbb90591962276dd7e59.exe 3000 a155acff10e4cbb90591962276dd7e59.exe 3000 a155acff10e4cbb90591962276dd7e59.exe 3000 a155acff10e4cbb90591962276dd7e59.exe 3000 a155acff10e4cbb90591962276dd7e59.exe 3000 a155acff10e4cbb90591962276dd7e59.exe 3000 a155acff10e4cbb90591962276dd7e59.exe 3000 a155acff10e4cbb90591962276dd7e59.exe 3000 a155acff10e4cbb90591962276dd7e59.exe 3000 a155acff10e4cbb90591962276dd7e59.exe 3000 a155acff10e4cbb90591962276dd7e59.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3000 a155acff10e4cbb90591962276dd7e59.exe Token: SeShutdownPrivilege 3000 a155acff10e4cbb90591962276dd7e59.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3000 a155acff10e4cbb90591962276dd7e59.exe 3000 a155acff10e4cbb90591962276dd7e59.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a155acff10e4cbb90591962276dd7e59.exe"C:\Users\Admin\AppData\Local\Temp\a155acff10e4cbb90591962276dd7e59.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3000