Analysis
-
max time kernel
148s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
15-03-2024 09:34
Static task
static1
Behavioral task
behavioral1
Sample
cb1210c9515e3e6bf5716048cb7ba3cf.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
cb1210c9515e3e6bf5716048cb7ba3cf.exe
Resource
win10v2004-20240226-en
General
-
Target
cb1210c9515e3e6bf5716048cb7ba3cf.exe
-
Size
2.1MB
-
MD5
cb1210c9515e3e6bf5716048cb7ba3cf
-
SHA1
9a57f751a71a63ac9b998a6a19b7a38b96349e53
-
SHA256
42c77364cebcb01102a85a8bb9a053a0e01d633c2e9710256e9d174a9f67effd
-
SHA512
ee6ca757e4dec2230255c26f66dfb20e225e22581e3c90359f168e976a5e12250ed24dd5305b6c59a673036841cedce682601fef5f4c9304843571c941c96990
-
SSDEEP
49152:1kIxSRHorTDMyDmFscevbcd/Fkl1DI8wGLSK4Erm8jJE3hGJGYRV6O37PckR1h:1k8SeDMbFs3Ad/FUIyHpcMhn1370kR1
Malware Config
Extracted
bitrat
1.38
gotti.ddnsgeek.com:8088
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
tor_process
tor
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
cb1210c9515e3e6bf5716048cb7ba3cf.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "\"C:\\Users\\Admin\\AppData\\Roaming\\oiqjWh2890agfhgW\\badmOsjhHZCI.exe\",explorer.exe" cb1210c9515e3e6bf5716048cb7ba3cf.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
vbc.exepid process 2900 vbc.exe 2900 vbc.exe 2900 vbc.exe 2900 vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
cb1210c9515e3e6bf5716048cb7ba3cf.exedescription pid process target process PID 2204 set thread context of 2900 2204 cb1210c9515e3e6bf5716048cb7ba3cf.exe vbc.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
cb1210c9515e3e6bf5716048cb7ba3cf.exepid process 2204 cb1210c9515e3e6bf5716048cb7ba3cf.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
cb1210c9515e3e6bf5716048cb7ba3cf.exevbc.exedescription pid process Token: SeDebugPrivilege 2204 cb1210c9515e3e6bf5716048cb7ba3cf.exe Token: SeDebugPrivilege 2204 cb1210c9515e3e6bf5716048cb7ba3cf.exe Token: SeDebugPrivilege 2900 vbc.exe Token: SeShutdownPrivilege 2900 vbc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
vbc.exepid process 2900 vbc.exe 2900 vbc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
cb1210c9515e3e6bf5716048cb7ba3cf.exedescription pid process target process PID 2204 wrote to memory of 2900 2204 cb1210c9515e3e6bf5716048cb7ba3cf.exe vbc.exe PID 2204 wrote to memory of 2900 2204 cb1210c9515e3e6bf5716048cb7ba3cf.exe vbc.exe PID 2204 wrote to memory of 2900 2204 cb1210c9515e3e6bf5716048cb7ba3cf.exe vbc.exe PID 2204 wrote to memory of 2900 2204 cb1210c9515e3e6bf5716048cb7ba3cf.exe vbc.exe PID 2204 wrote to memory of 2900 2204 cb1210c9515e3e6bf5716048cb7ba3cf.exe vbc.exe PID 2204 wrote to memory of 2900 2204 cb1210c9515e3e6bf5716048cb7ba3cf.exe vbc.exe PID 2204 wrote to memory of 2900 2204 cb1210c9515e3e6bf5716048cb7ba3cf.exe vbc.exe PID 2204 wrote to memory of 2900 2204 cb1210c9515e3e6bf5716048cb7ba3cf.exe vbc.exe PID 2204 wrote to memory of 2900 2204 cb1210c9515e3e6bf5716048cb7ba3cf.exe vbc.exe PID 2204 wrote to memory of 2900 2204 cb1210c9515e3e6bf5716048cb7ba3cf.exe vbc.exe PID 2204 wrote to memory of 2900 2204 cb1210c9515e3e6bf5716048cb7ba3cf.exe vbc.exe PID 2204 wrote to memory of 2900 2204 cb1210c9515e3e6bf5716048cb7ba3cf.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb1210c9515e3e6bf5716048cb7ba3cf.exe"C:\Users\Admin\AppData\Local\Temp\cb1210c9515e3e6bf5716048cb7ba3cf.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2900
-