Analysis
-
max time kernel
143s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-02-2024 08:58
Behavioral task
behavioral1
Sample
d2b72bd6cee1271893c87cae3e8344d886822c573e30e9dc3462fd47a4fc4a59.exe
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
d2b72bd6cee1271893c87cae3e8344d886822c573e30e9dc3462fd47a4fc4a59.exe
-
Size
3.8MB
-
MD5
10830da42415992deb3d29402666a221
-
SHA1
1b2e92f0114140a5e6cbfc242760543925a503f8
-
SHA256
d2b72bd6cee1271893c87cae3e8344d886822c573e30e9dc3462fd47a4fc4a59
-
SHA512
02dcb4a0ad50339261a9000a446376fa43f354bebecd4c6503d19b808c0e669bea640b50689921487d65d5987ab58c2bb3ff2bafbc0b399b921a9c75b5bcb71c
-
SSDEEP
98304:d77Pmq33rE/JDLPWZADUGer7B6iY74M/FmlwXVZ4FBw:5+R/eZADUXRk
Malware Config
Extracted
Family
bitrat
Version
1.38
C2
65.21.3.192:1234
Attributes
-
communication_password
e807f1fcf82d132f9bb018ca6738a19f
-
tor_process
tor
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
d2b72bd6cee1271893c87cae3e8344d886822c573e30e9dc3462fd47a4fc4a59.exepid process 2944 d2b72bd6cee1271893c87cae3e8344d886822c573e30e9dc3462fd47a4fc4a59.exe 2944 d2b72bd6cee1271893c87cae3e8344d886822c573e30e9dc3462fd47a4fc4a59.exe 2944 d2b72bd6cee1271893c87cae3e8344d886822c573e30e9dc3462fd47a4fc4a59.exe 2944 d2b72bd6cee1271893c87cae3e8344d886822c573e30e9dc3462fd47a4fc4a59.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
d2b72bd6cee1271893c87cae3e8344d886822c573e30e9dc3462fd47a4fc4a59.exedescription pid process Token: SeDebugPrivilege 2944 d2b72bd6cee1271893c87cae3e8344d886822c573e30e9dc3462fd47a4fc4a59.exe Token: SeShutdownPrivilege 2944 d2b72bd6cee1271893c87cae3e8344d886822c573e30e9dc3462fd47a4fc4a59.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
d2b72bd6cee1271893c87cae3e8344d886822c573e30e9dc3462fd47a4fc4a59.exepid process 2944 d2b72bd6cee1271893c87cae3e8344d886822c573e30e9dc3462fd47a4fc4a59.exe 2944 d2b72bd6cee1271893c87cae3e8344d886822c573e30e9dc3462fd47a4fc4a59.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2b72bd6cee1271893c87cae3e8344d886822c573e30e9dc3462fd47a4fc4a59.exe"C:\Users\Admin\AppData\Local\Temp\d2b72bd6cee1271893c87cae3e8344d886822c573e30e9dc3462fd47a4fc4a59.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2944