Analysis
-
max time kernel
144s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-02-2024 10:38
Behavioral task
behavioral1
Sample
81a157edc604cc6673fa3db1195880155f18fcbd7233e713c022279b0a355991.exe
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
81a157edc604cc6673fa3db1195880155f18fcbd7233e713c022279b0a355991.exe
-
Size
3.8MB
-
MD5
ff2accf0c6c1124fa66cb199e9f62a88
-
SHA1
92d36cda33a2234eb668fd8f964a6e92606ac8c3
-
SHA256
81a157edc604cc6673fa3db1195880155f18fcbd7233e713c022279b0a355991
-
SHA512
5414339ea996f4b090eb6b9c187357aef8271b21ea08b90ed7453e50cd4108a1a895fe9cc682775d4c563e69e22854134fba0cee9247f994ab30034e4ca53cd5
-
SSDEEP
98304:d77Pmq33rE/JDLPWZADUGer7B6iY74M/bmlwXVZ4FBS:5+R/eZADUXRM
Malware Config
Extracted
Family
bitrat
Version
1.38
C2
encrypted-channel.duckdns.org:443
Attributes
-
communication_password
fe2d38267c9396132e3c55d49af5b3f2
-
tor_process
tor
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
81a157edc604cc6673fa3db1195880155f18fcbd7233e713c022279b0a355991.exepid process 1472 81a157edc604cc6673fa3db1195880155f18fcbd7233e713c022279b0a355991.exe 1472 81a157edc604cc6673fa3db1195880155f18fcbd7233e713c022279b0a355991.exe 1472 81a157edc604cc6673fa3db1195880155f18fcbd7233e713c022279b0a355991.exe 1472 81a157edc604cc6673fa3db1195880155f18fcbd7233e713c022279b0a355991.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
81a157edc604cc6673fa3db1195880155f18fcbd7233e713c022279b0a355991.exedescription pid process Token: SeShutdownPrivilege 1472 81a157edc604cc6673fa3db1195880155f18fcbd7233e713c022279b0a355991.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
81a157edc604cc6673fa3db1195880155f18fcbd7233e713c022279b0a355991.exepid process 1472 81a157edc604cc6673fa3db1195880155f18fcbd7233e713c022279b0a355991.exe 1472 81a157edc604cc6673fa3db1195880155f18fcbd7233e713c022279b0a355991.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\81a157edc604cc6673fa3db1195880155f18fcbd7233e713c022279b0a355991.exe"C:\Users\Admin\AppData\Local\Temp\81a157edc604cc6673fa3db1195880155f18fcbd7233e713c022279b0a355991.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1472