Analysis
-
max time kernel
152s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
26-02-2024 12:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a65c5d8268daf8603d3f4861991cb09e.exe
Resource
win7-20240221-en
windows7-x64
7 signatures
150 seconds
General
-
Target
a65c5d8268daf8603d3f4861991cb09e.exe
-
Size
1.6MB
-
MD5
a65c5d8268daf8603d3f4861991cb09e
-
SHA1
8b22cbad5c3d38e4a683f1b68a3b9037eb3559f1
-
SHA256
3a3ff370dac609a17ea67e35e81a3b82702afe6660bb3439a489ff8f4350d607
-
SHA512
faad2d2928c982f30d10299ae266571127bd98d16a7577f9c2e5a10f349ea92855da2fa180bfb355daa88e9a6e2f38ad335bec61fd7f13c0a102ac4480baff4e
-
SSDEEP
49152:7vzezLpGAOtBRskfPrJ5eZzZO+1AqGF4F/jSK:70V3OHskfP9QZjAq+4F/j
Malware Config
Extracted
Family
bitrat
Version
1.38
C2
185.157.161.53:97
Attributes
-
communication_password
56f5d64777d37a2cec5a87a5061a35b4
-
tor_process
tor
Signatures
-
resource yara_rule behavioral2/memory/3580-3-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3580-4-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3580-5-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3580-7-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3580-6-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3580-8-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3580-10-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3580-11-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3580-12-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3580-13-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3580-14-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3580-15-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3580-16-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3580-18-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3580-20-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3580-21-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3580-22-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3580-33-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3580-36-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3580-37-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3580-39-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3580-43-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3580-44-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3580-46-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3580-49-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3580-50-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3580 a65c5d8268daf8603d3f4861991cb09e.exe 3580 a65c5d8268daf8603d3f4861991cb09e.exe 3580 a65c5d8268daf8603d3f4861991cb09e.exe 3580 a65c5d8268daf8603d3f4861991cb09e.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 824 set thread context of 3580 824 a65c5d8268daf8603d3f4861991cb09e.exe 85 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 3580 a65c5d8268daf8603d3f4861991cb09e.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3580 a65c5d8268daf8603d3f4861991cb09e.exe 3580 a65c5d8268daf8603d3f4861991cb09e.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 824 wrote to memory of 3580 824 a65c5d8268daf8603d3f4861991cb09e.exe 85 PID 824 wrote to memory of 3580 824 a65c5d8268daf8603d3f4861991cb09e.exe 85 PID 824 wrote to memory of 3580 824 a65c5d8268daf8603d3f4861991cb09e.exe 85 PID 824 wrote to memory of 3580 824 a65c5d8268daf8603d3f4861991cb09e.exe 85 PID 824 wrote to memory of 3580 824 a65c5d8268daf8603d3f4861991cb09e.exe 85 PID 824 wrote to memory of 3580 824 a65c5d8268daf8603d3f4861991cb09e.exe 85 PID 824 wrote to memory of 3580 824 a65c5d8268daf8603d3f4861991cb09e.exe 85 PID 824 wrote to memory of 3580 824 a65c5d8268daf8603d3f4861991cb09e.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\a65c5d8268daf8603d3f4861991cb09e.exe"C:\Users\Admin\AppData\Local\Temp\a65c5d8268daf8603d3f4861991cb09e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Local\Temp\a65c5d8268daf8603d3f4861991cb09e.exe"C:\Users\Admin\AppData\Local\Temp\a65c5d8268daf8603d3f4861991cb09e.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3580
-