Analysis
-
max time kernel
159s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-03-2024 15:47
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3290.png.dll
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
3290.png.dll
Resource
win10v2004-20240226-en
windows10-2004-x64
7 signatures
150 seconds
Behavioral task
behavioral3
Sample
launcher.bat
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
General
-
Target
launcher.bat
-
Size
70B
-
MD5
70c96b6b962525522af80754c7bcd149
-
SHA1
53f0dfda950efc0accdf179c43df49ffc1709787
-
SHA256
98bb57008710d6606f39855433c3f080921cddcd23efa6862208fd8749258976
-
SHA512
830468a2ed9d2334a73381b833e6bbe2de79482efc20cb8e2af36522df57295e88efabe66e3b8b5310338eca44429817570220d7d5cf32285a05fb9d1a5a7dfb
Malware Config
Extracted
Family
pikabot
C2
154.53.55.165
158.247.240.58
154.12.236.248
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1204 set thread context of 1980 1204 rundll32.exe 94 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe 1204 rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1204 rundll32.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
pid Process 1204 rundll32.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 5092 wrote to memory of 1104 5092 cmd.exe 89 PID 5092 wrote to memory of 1104 5092 cmd.exe 89 PID 1104 wrote to memory of 1204 1104 rundll32.exe 90 PID 1104 wrote to memory of 1204 1104 rundll32.exe 90 PID 1104 wrote to memory of 1204 1104 rundll32.exe 90 PID 1204 wrote to memory of 1980 1204 rundll32.exe 94 PID 1204 wrote to memory of 1980 1204 rundll32.exe 94 PID 1204 wrote to memory of 1980 1204 rundll32.exe 94 PID 1204 wrote to memory of 1980 1204 rundll32.exe 94 PID 1204 wrote to memory of 1980 1204 rundll32.exe 94 PID 1204 wrote to memory of 1980 1204 rundll32.exe 94 PID 1204 wrote to memory of 1980 1204 rundll32.exe 94 PID 1204 wrote to memory of 1980 1204 rundll32.exe 94
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\launcher.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\system32\rundll32.exerundll32.exe 3290.png.dll,GetModuleProp2⤵
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe 3290.png.dll,GetModuleProp3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\ctfmon.exe"C:\Windows\SysWOW64\ctfmon.exe -p 1234"4⤵PID:1980
-
-
-