Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-03-2024 05:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
bdcdb05af6a2ac95bb13857ab6b6debc.exe
Resource
win7-20240221-en
windows7-x64
7 signatures
150 seconds
General
-
Target
bdcdb05af6a2ac95bb13857ab6b6debc.exe
-
Size
1.7MB
-
MD5
bdcdb05af6a2ac95bb13857ab6b6debc
-
SHA1
93999f28d1c8391d60830be5202233b63db93301
-
SHA256
09df08b715bf11a0bc6cb5cdc5cd724927ba6c6a18ca2896f153d9b424196767
-
SHA512
7a25c9768a0181bf3000c56d8f739a1835aa9114761a20e7d8ed21318467556acc26e183e832b907122fe2f2c32ab1750ccb3d016a2abead43955ad7050f73e5
-
SSDEEP
49152:7jr8QuQLqpb0/udMUNPlam4t1Uyru4YNsbN:7nhuQWb0/uWUNPlL4t1dNYUN
Malware Config
Extracted
Family
bitrat
Version
1.38
C2
eewe.ddns.net:2880
Attributes
-
communication_password
b18aba2f7c3bf981f4caba4a41e6b205
-
tor_process
tor
Signatures
-
resource yara_rule behavioral1/memory/2268-5-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-7-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-8-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-9-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-10-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-11-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-12-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-14-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-15-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-16-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-17-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-18-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-19-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-20-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-21-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-22-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-23-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-24-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-25-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-27-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-28-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-29-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-30-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-31-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-32-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-34-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-35-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-36-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-37-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-38-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-39-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-41-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-42-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-43-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-44-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-45-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-46-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-48-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-49-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2268-50-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2268 bdcdb05af6a2ac95bb13857ab6b6debc.exe 2268 bdcdb05af6a2ac95bb13857ab6b6debc.exe 2268 bdcdb05af6a2ac95bb13857ab6b6debc.exe 2268 bdcdb05af6a2ac95bb13857ab6b6debc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2016 set thread context of 2268 2016 bdcdb05af6a2ac95bb13857ab6b6debc.exe 28 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2268 bdcdb05af6a2ac95bb13857ab6b6debc.exe Token: SeShutdownPrivilege 2268 bdcdb05af6a2ac95bb13857ab6b6debc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2268 bdcdb05af6a2ac95bb13857ab6b6debc.exe 2268 bdcdb05af6a2ac95bb13857ab6b6debc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2268 2016 bdcdb05af6a2ac95bb13857ab6b6debc.exe 28 PID 2016 wrote to memory of 2268 2016 bdcdb05af6a2ac95bb13857ab6b6debc.exe 28 PID 2016 wrote to memory of 2268 2016 bdcdb05af6a2ac95bb13857ab6b6debc.exe 28 PID 2016 wrote to memory of 2268 2016 bdcdb05af6a2ac95bb13857ab6b6debc.exe 28 PID 2016 wrote to memory of 2268 2016 bdcdb05af6a2ac95bb13857ab6b6debc.exe 28 PID 2016 wrote to memory of 2268 2016 bdcdb05af6a2ac95bb13857ab6b6debc.exe 28 PID 2016 wrote to memory of 2268 2016 bdcdb05af6a2ac95bb13857ab6b6debc.exe 28 PID 2016 wrote to memory of 2268 2016 bdcdb05af6a2ac95bb13857ab6b6debc.exe 28 PID 2016 wrote to memory of 2268 2016 bdcdb05af6a2ac95bb13857ab6b6debc.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bdcdb05af6a2ac95bb13857ab6b6debc.exe"C:\Users\Admin\AppData\Local\Temp\bdcdb05af6a2ac95bb13857ab6b6debc.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\bdcdb05af6a2ac95bb13857ab6b6debc.exe"C:\Users\Admin\AppData\Local\Temp\bdcdb05af6a2ac95bb13857ab6b6debc.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2268
-