Analysis
-
max time kernel
174s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-02-2024 10:38
Behavioral task
behavioral1
Sample
a62fe97a7a3e6f419cedafbe6681f202237c8dc03ecbdf2b5ce3df951675f7f5.exe
Resource
win7-20240221-en
General
-
Target
a62fe97a7a3e6f419cedafbe6681f202237c8dc03ecbdf2b5ce3df951675f7f5.exe
-
Size
3.8MB
-
MD5
34205fbcec076217e2c64ba7611c176d
-
SHA1
e9bb8988e27694913e53ecb39a28581b1972798e
-
SHA256
a62fe97a7a3e6f419cedafbe6681f202237c8dc03ecbdf2b5ce3df951675f7f5
-
SHA512
4780690315a244938d5f8a5e8650445cbe49f29a2d90a5c73c7281bc021c5361f14229b65621c12c2b5c5cdc000cca094ed53f63540f7f5acd2d277af611528f
-
SSDEEP
49152:zXUIEeZzdeh/c7p1rNdd+JNEj0ykdj21x1YhFlX4bA/Hg/11VzeLG/7wqNKB2VIx:zXrEeZzdhjuV/gd1VzsGUqNKTHvQeM6
Malware Config
Extracted
bitrat
1.35
103.89.91.38:3390
-
communication_password
827ccb0eea8a706c4c34a16891f84e7b
-
tor_process
tor
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
a62fe97a7a3e6f419cedafbe6681f202237c8dc03ecbdf2b5ce3df951675f7f5.exepid process 1728 a62fe97a7a3e6f419cedafbe6681f202237c8dc03ecbdf2b5ce3df951675f7f5.exe 1728 a62fe97a7a3e6f419cedafbe6681f202237c8dc03ecbdf2b5ce3df951675f7f5.exe 1728 a62fe97a7a3e6f419cedafbe6681f202237c8dc03ecbdf2b5ce3df951675f7f5.exe 1728 a62fe97a7a3e6f419cedafbe6681f202237c8dc03ecbdf2b5ce3df951675f7f5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a62fe97a7a3e6f419cedafbe6681f202237c8dc03ecbdf2b5ce3df951675f7f5.exedescription pid process Token: SeShutdownPrivilege 1728 a62fe97a7a3e6f419cedafbe6681f202237c8dc03ecbdf2b5ce3df951675f7f5.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
a62fe97a7a3e6f419cedafbe6681f202237c8dc03ecbdf2b5ce3df951675f7f5.exepid process 1728 a62fe97a7a3e6f419cedafbe6681f202237c8dc03ecbdf2b5ce3df951675f7f5.exe 1728 a62fe97a7a3e6f419cedafbe6681f202237c8dc03ecbdf2b5ce3df951675f7f5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a62fe97a7a3e6f419cedafbe6681f202237c8dc03ecbdf2b5ce3df951675f7f5.exe"C:\Users\Admin\AppData\Local\Temp\a62fe97a7a3e6f419cedafbe6681f202237c8dc03ecbdf2b5ce3df951675f7f5.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1728-0-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1728-1-0x00000000744E0000-0x0000000074519000-memory.dmpFilesize
228KB
-
memory/1728-2-0x00000000748A0000-0x00000000748D9000-memory.dmpFilesize
228KB
-
memory/1728-3-0x00000000748A0000-0x00000000748D9000-memory.dmpFilesize
228KB
-
memory/1728-4-0x00000000748A0000-0x00000000748D9000-memory.dmpFilesize
228KB
-
memory/1728-5-0x00000000748A0000-0x00000000748D9000-memory.dmpFilesize
228KB
-
memory/1728-6-0x00000000748A0000-0x00000000748D9000-memory.dmpFilesize
228KB
-
memory/1728-7-0x00000000748A0000-0x00000000748D9000-memory.dmpFilesize
228KB
-
memory/1728-8-0x00000000748A0000-0x00000000748D9000-memory.dmpFilesize
228KB
-
memory/1728-9-0x00000000748A0000-0x00000000748D9000-memory.dmpFilesize
228KB
-
memory/1728-10-0x00000000748A0000-0x00000000748D9000-memory.dmpFilesize
228KB