Analysis
-
max time kernel
158s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
17-03-2024 23:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe
Resource
win7-20240221-en
windows7-x64
1 signatures
150 seconds
General
-
Target
bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe
-
Size
1.4MB
-
MD5
fbd290164b013766679f8096fd974b53
-
SHA1
7365c77a7b7dff53579346359e9b0ec5b8ba8b06
-
SHA256
bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace
-
SHA512
0e2d1e6e4eacf5cd6e04715036760875e771dc342fbb46fdb3fd2748ba940ceac90e0bf16f3403b3d9626cc884631028b6d11446515d85913a5a61218687540d
-
SSDEEP
24576:60/wpWGxRsnyM3LF+0mlBnjs60nEisX1N9rm1Jo/13JQyjLc22dEaY7Unbya87CJ:n/wn0x3LFfmHnIZE9rm1Ji3hLc22dEa3
Malware Config
Extracted
Family
pikabot
C2
23.226.138.161
104.129.55.105
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exedescription pid process target process PID 1208 set thread context of 656 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe ctfmon.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exepid process 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exepid process 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
Processes:
bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exepid process 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exedescription pid process target process PID 1208 wrote to memory of 656 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe ctfmon.exe PID 1208 wrote to memory of 656 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe ctfmon.exe PID 1208 wrote to memory of 656 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe ctfmon.exe PID 1208 wrote to memory of 656 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe ctfmon.exe PID 1208 wrote to memory of 656 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe ctfmon.exe PID 1208 wrote to memory of 656 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe ctfmon.exe PID 1208 wrote to memory of 656 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe ctfmon.exe PID 1208 wrote to memory of 656 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe ctfmon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe"C:\Users\Admin\AppData\Local\Temp\bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\SysWOW64\ctfmon.exe"C:\Windows\SysWOW64\ctfmon.exe -p 1234"2⤵PID:656
-