Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12-03-2024 01:37
Behavioral task
behavioral1
Sample
c22194f8c9d2356851b2b481f07bc971.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
c22194f8c9d2356851b2b481f07bc971.exe
-
Size
1.4MB
-
MD5
c22194f8c9d2356851b2b481f07bc971
-
SHA1
cf3a5c002a563f41ef923fa5bfb4e4a0a5238fab
-
SHA256
e0d581b844860e06d662845e8e018c68656241fd0f26e34770f113b7e3df31d8
-
SHA512
110734f2bdbc906dcff8e24d8570228c2c5c40b1eb2e8df949edeccb2bf531b177a23780c1ece4dd3069445d7c270d13f0593e529accedf793a1b7f388ebdbf1
-
SSDEEP
24576:XndRKZCy2BrhCeU2i2cJijFbCBTPmiY05tJMSQp5ysA7Yg1nLkzymmVJHg:3XDFBU2iIBb0xY/6sUYYnmmVJA
Malware Config
Extracted
Family
bitrat
Version
1.38
C2
88.99.219.185:4041
Attributes
-
communication_password
f9f7b89372a4c688735e0ec16cec18ef
-
tor_process
tor
Signatures
-
Processes:
resource yara_rule behavioral2/memory/1108-0-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/1108-3-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/1108-5-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/1108-9-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/1108-12-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/1108-15-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/1108-18-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/1108-20-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/1108-23-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
c22194f8c9d2356851b2b481f07bc971.exepid process 1108 c22194f8c9d2356851b2b481f07bc971.exe 1108 c22194f8c9d2356851b2b481f07bc971.exe 1108 c22194f8c9d2356851b2b481f07bc971.exe 1108 c22194f8c9d2356851b2b481f07bc971.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
c22194f8c9d2356851b2b481f07bc971.exedescription pid process Token: SeShutdownPrivilege 1108 c22194f8c9d2356851b2b481f07bc971.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
c22194f8c9d2356851b2b481f07bc971.exepid process 1108 c22194f8c9d2356851b2b481f07bc971.exe 1108 c22194f8c9d2356851b2b481f07bc971.exe