Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-02-2024 12:42
Behavioral task
behavioral1
Sample
87e6b22b6bb6e248e32715559ede43e88a608adfe0b212b163f149ee321dbc9e.exe
Resource
win7-20240221-en
General
-
Target
87e6b22b6bb6e248e32715559ede43e88a608adfe0b212b163f149ee321dbc9e.exe
-
Size
3.8MB
-
MD5
6a4dde85bb3ca671d8f2f82c5290de16
-
SHA1
b7738a48df222c0088cfaa46afc274aa4b75b747
-
SHA256
87e6b22b6bb6e248e32715559ede43e88a608adfe0b212b163f149ee321dbc9e
-
SHA512
d93efae54bfa954874d5468c076fc0c1ab8d7b6856f8fdce1b191362f0dd4f76e20d586b56cf9db816e7b9d4470032373dd0371aad5aee330e1a005e43f40b11
-
SSDEEP
49152:keLX23QW5VbNxuL1sEAjBQVwgY5uQUTkXsVB7xnkm3bexnl75Qw2igESW4GJOt8S:xE5NxuLoBa9w2igESjGy8XYAoJP
Malware Config
Extracted
bitrat
1.34
vonix.hopto.org:5454
-
communication_password
b408ad1bf4c5ad294e1358381c55eb5c
-
tor_process
tor
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
87e6b22b6bb6e248e32715559ede43e88a608adfe0b212b163f149ee321dbc9e.exepid process 5864 87e6b22b6bb6e248e32715559ede43e88a608adfe0b212b163f149ee321dbc9e.exe 5864 87e6b22b6bb6e248e32715559ede43e88a608adfe0b212b163f149ee321dbc9e.exe 5864 87e6b22b6bb6e248e32715559ede43e88a608adfe0b212b163f149ee321dbc9e.exe 5864 87e6b22b6bb6e248e32715559ede43e88a608adfe0b212b163f149ee321dbc9e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
87e6b22b6bb6e248e32715559ede43e88a608adfe0b212b163f149ee321dbc9e.exedescription pid process Token: SeShutdownPrivilege 5864 87e6b22b6bb6e248e32715559ede43e88a608adfe0b212b163f149ee321dbc9e.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
87e6b22b6bb6e248e32715559ede43e88a608adfe0b212b163f149ee321dbc9e.exepid process 5864 87e6b22b6bb6e248e32715559ede43e88a608adfe0b212b163f149ee321dbc9e.exe 5864 87e6b22b6bb6e248e32715559ede43e88a608adfe0b212b163f149ee321dbc9e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\87e6b22b6bb6e248e32715559ede43e88a608adfe0b212b163f149ee321dbc9e.exe"C:\Users\Admin\AppData\Local\Temp\87e6b22b6bb6e248e32715559ede43e88a608adfe0b212b163f149ee321dbc9e.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/5864-0-0x0000000000400000-0x00000000007CD000-memory.dmpFilesize
3.8MB
-
memory/5864-1-0x00000000744F0000-0x0000000074529000-memory.dmpFilesize
228KB
-
memory/5864-2-0x0000000074910000-0x0000000074949000-memory.dmpFilesize
228KB
-
memory/5864-3-0x0000000074910000-0x0000000074949000-memory.dmpFilesize
228KB
-
memory/5864-4-0x0000000074910000-0x0000000074949000-memory.dmpFilesize
228KB
-
memory/5864-5-0x0000000074910000-0x0000000074949000-memory.dmpFilesize
228KB
-
memory/5864-6-0x0000000074910000-0x0000000074949000-memory.dmpFilesize
228KB
-
memory/5864-7-0x0000000074910000-0x0000000074949000-memory.dmpFilesize
228KB
-
memory/5864-8-0x0000000074910000-0x0000000074949000-memory.dmpFilesize
228KB
-
memory/5864-9-0x0000000074910000-0x0000000074949000-memory.dmpFilesize
228KB
-
memory/5864-10-0x0000000074910000-0x0000000074949000-memory.dmpFilesize
228KB
-
memory/5864-11-0x0000000074910000-0x0000000074949000-memory.dmpFilesize
228KB
-
memory/5864-12-0x0000000074910000-0x0000000074949000-memory.dmpFilesize
228KB