Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-02-2024 09:46
Behavioral task
behavioral1
Sample
f4088e6672ab5c67475864cd429734c4693269b72377f06a3f55a48b333390cc.exe
Resource
win7-20240220-en
windows7-x64
4 signatures
150 seconds
General
-
Target
f4088e6672ab5c67475864cd429734c4693269b72377f06a3f55a48b333390cc.exe
-
Size
3.8MB
-
MD5
597c03ec993d20052e1d0a9d5853ce5b
-
SHA1
9465c11cdcb81d0943376ae43b9dd77c515c8f01
-
SHA256
f4088e6672ab5c67475864cd429734c4693269b72377f06a3f55a48b333390cc
-
SHA512
34bac5acbc0044acb77da9ad215c7351883914f3a3914f4945b05c7899d22f0321f7fdaed0920d546e3cfdcac9c386228dce8b53f7d4be8324fba909000c366d
-
SSDEEP
49152:zXUIEeZzdeh/c7p1rNdd+JNEj0ykdj21x1YhFlX4bA/Hg/11VzeLG/7wqNKB2VIb:zXrEeZzdhjuV/gd1VzsGUqNKTHvQey6
Malware Config
Extracted
Family
bitrat
Version
1.35
C2
yatzufn.ddns.net:1900
Attributes
-
communication_password
202cb962ac59075b964b07152d234b70
-
tor_process
tor
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
f4088e6672ab5c67475864cd429734c4693269b72377f06a3f55a48b333390cc.exepid process 1576 f4088e6672ab5c67475864cd429734c4693269b72377f06a3f55a48b333390cc.exe 1576 f4088e6672ab5c67475864cd429734c4693269b72377f06a3f55a48b333390cc.exe 1576 f4088e6672ab5c67475864cd429734c4693269b72377f06a3f55a48b333390cc.exe 1576 f4088e6672ab5c67475864cd429734c4693269b72377f06a3f55a48b333390cc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
f4088e6672ab5c67475864cd429734c4693269b72377f06a3f55a48b333390cc.exedescription pid process Token: SeShutdownPrivilege 1576 f4088e6672ab5c67475864cd429734c4693269b72377f06a3f55a48b333390cc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
f4088e6672ab5c67475864cd429734c4693269b72377f06a3f55a48b333390cc.exepid process 1576 f4088e6672ab5c67475864cd429734c4693269b72377f06a3f55a48b333390cc.exe 1576 f4088e6672ab5c67475864cd429734c4693269b72377f06a3f55a48b333390cc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4088e6672ab5c67475864cd429734c4693269b72377f06a3f55a48b333390cc.exe"C:\Users\Admin\AppData\Local\Temp\f4088e6672ab5c67475864cd429734c4693269b72377f06a3f55a48b333390cc.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1576