Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-02-2024 10:35
Behavioral task
behavioral1
Sample
fad1213b89bc1aba6de7d9578afb959999dbb29da8d0365d8179c40247365a02.exe
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
fad1213b89bc1aba6de7d9578afb959999dbb29da8d0365d8179c40247365a02.exe
-
Size
3.8MB
-
MD5
5a8d9d220e536dbe8f54485cc2e39cea
-
SHA1
74f485784c9fb72996b74c740fcc9eb79416e363
-
SHA256
fad1213b89bc1aba6de7d9578afb959999dbb29da8d0365d8179c40247365a02
-
SHA512
335d3fd38e902033cd47557ab763e658b5fb890950633f07a1e9bdac5a2c2178bb2318824e5a7ccf8ceb1e48103646b0d2d0729371645fd294bb31528b905ae6
-
SSDEEP
98304:d77Pmq33rE/JDLPWZADUGer7B6iY74M/5mlwXVZ4FB:5+R/eZADUXR
Malware Config
Extracted
Family
bitrat
Version
1.38
C2
185.244.36.230:1240
Attributes
-
communication_password
c6fed437703e9d8089261b58c870ed00
-
tor_process
tor
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
fad1213b89bc1aba6de7d9578afb959999dbb29da8d0365d8179c40247365a02.exepid process 2420 fad1213b89bc1aba6de7d9578afb959999dbb29da8d0365d8179c40247365a02.exe 2420 fad1213b89bc1aba6de7d9578afb959999dbb29da8d0365d8179c40247365a02.exe 2420 fad1213b89bc1aba6de7d9578afb959999dbb29da8d0365d8179c40247365a02.exe 2420 fad1213b89bc1aba6de7d9578afb959999dbb29da8d0365d8179c40247365a02.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
fad1213b89bc1aba6de7d9578afb959999dbb29da8d0365d8179c40247365a02.exedescription pid process Token: SeShutdownPrivilege 2420 fad1213b89bc1aba6de7d9578afb959999dbb29da8d0365d8179c40247365a02.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
fad1213b89bc1aba6de7d9578afb959999dbb29da8d0365d8179c40247365a02.exepid process 2420 fad1213b89bc1aba6de7d9578afb959999dbb29da8d0365d8179c40247365a02.exe 2420 fad1213b89bc1aba6de7d9578afb959999dbb29da8d0365d8179c40247365a02.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fad1213b89bc1aba6de7d9578afb959999dbb29da8d0365d8179c40247365a02.exe"C:\Users\Admin\AppData\Local\Temp\fad1213b89bc1aba6de7d9578afb959999dbb29da8d0365d8179c40247365a02.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2420