Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-02-2024 12:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a65c5d8268daf8603d3f4861991cb09e.exe
Resource
win7-20240221-en
windows7-x64
7 signatures
150 seconds
General
-
Target
a65c5d8268daf8603d3f4861991cb09e.exe
-
Size
1.6MB
-
MD5
a65c5d8268daf8603d3f4861991cb09e
-
SHA1
8b22cbad5c3d38e4a683f1b68a3b9037eb3559f1
-
SHA256
3a3ff370dac609a17ea67e35e81a3b82702afe6660bb3439a489ff8f4350d607
-
SHA512
faad2d2928c982f30d10299ae266571127bd98d16a7577f9c2e5a10f349ea92855da2fa180bfb355daa88e9a6e2f38ad335bec61fd7f13c0a102ac4480baff4e
-
SSDEEP
49152:7vzezLpGAOtBRskfPrJ5eZzZO+1AqGF4F/jSK:70V3OHskfP9QZjAq+4F/j
Malware Config
Extracted
Family
bitrat
Version
1.38
C2
185.157.161.53:97
Attributes
-
communication_password
56f5d64777d37a2cec5a87a5061a35b4
-
tor_process
tor
Signatures
-
resource yara_rule behavioral1/memory/304-5-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/304-7-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/304-8-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/304-9-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/304-10-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/304-11-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/304-13-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/304-15-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/304-17-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/304-18-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/304-20-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/304-21-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/304-22-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/304-26-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/304-27-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/304-28-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/304-32-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/304-33-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/304-34-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/304-37-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/304-38-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/304-39-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 304 a65c5d8268daf8603d3f4861991cb09e.exe 304 a65c5d8268daf8603d3f4861991cb09e.exe 304 a65c5d8268daf8603d3f4861991cb09e.exe 304 a65c5d8268daf8603d3f4861991cb09e.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2384 set thread context of 304 2384 a65c5d8268daf8603d3f4861991cb09e.exe 28 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 304 a65c5d8268daf8603d3f4861991cb09e.exe Token: SeShutdownPrivilege 304 a65c5d8268daf8603d3f4861991cb09e.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 304 a65c5d8268daf8603d3f4861991cb09e.exe 304 a65c5d8268daf8603d3f4861991cb09e.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2384 wrote to memory of 304 2384 a65c5d8268daf8603d3f4861991cb09e.exe 28 PID 2384 wrote to memory of 304 2384 a65c5d8268daf8603d3f4861991cb09e.exe 28 PID 2384 wrote to memory of 304 2384 a65c5d8268daf8603d3f4861991cb09e.exe 28 PID 2384 wrote to memory of 304 2384 a65c5d8268daf8603d3f4861991cb09e.exe 28 PID 2384 wrote to memory of 304 2384 a65c5d8268daf8603d3f4861991cb09e.exe 28 PID 2384 wrote to memory of 304 2384 a65c5d8268daf8603d3f4861991cb09e.exe 28 PID 2384 wrote to memory of 304 2384 a65c5d8268daf8603d3f4861991cb09e.exe 28 PID 2384 wrote to memory of 304 2384 a65c5d8268daf8603d3f4861991cb09e.exe 28 PID 2384 wrote to memory of 304 2384 a65c5d8268daf8603d3f4861991cb09e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a65c5d8268daf8603d3f4861991cb09e.exe"C:\Users\Admin\AppData\Local\Temp\a65c5d8268daf8603d3f4861991cb09e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\a65c5d8268daf8603d3f4861991cb09e.exe"C:\Users\Admin\AppData\Local\Temp\a65c5d8268daf8603d3f4861991cb09e.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:304
-