Analysis
-
max time kernel
158s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
17-03-2024 23:22
Static task
static1
Behavioral task
behavioral1
Sample
bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe
Resource
win7-20240221-en
General
-
Target
bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe
-
Size
1.4MB
-
MD5
fbd290164b013766679f8096fd974b53
-
SHA1
7365c77a7b7dff53579346359e9b0ec5b8ba8b06
-
SHA256
bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace
-
SHA512
0e2d1e6e4eacf5cd6e04715036760875e771dc342fbb46fdb3fd2748ba940ceac90e0bf16f3403b3d9626cc884631028b6d11446515d85913a5a61218687540d
-
SSDEEP
24576:60/wpWGxRsnyM3LF+0mlBnjs60nEisX1N9rm1Jo/13JQyjLc22dEaY7Unbya87CJ:n/wn0x3LFfmHnIZE9rm1Ji3hLc22dEa3
Malware Config
Extracted
pikabot
23.226.138.161
104.129.55.105
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exedescription pid process target process PID 1208 set thread context of 656 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe ctfmon.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exepid process 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exepid process 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
Processes:
bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exepid process 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exedescription pid process target process PID 1208 wrote to memory of 656 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe ctfmon.exe PID 1208 wrote to memory of 656 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe ctfmon.exe PID 1208 wrote to memory of 656 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe ctfmon.exe PID 1208 wrote to memory of 656 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe ctfmon.exe PID 1208 wrote to memory of 656 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe ctfmon.exe PID 1208 wrote to memory of 656 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe ctfmon.exe PID 1208 wrote to memory of 656 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe ctfmon.exe PID 1208 wrote to memory of 656 1208 bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe ctfmon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe"C:\Users\Admin\AppData\Local\Temp\bd879fb7fdde311c8fd7d48f402cf5de0b7772bc3f24bb78a357c978f8681ace.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\ctfmon.exe"C:\Windows\SysWOW64\ctfmon.exe -p 1234"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/656-1-0x00000000010C0000-0x00000000010D8000-memory.dmpFilesize
96KB
-
memory/656-8-0x00000000010C0000-0x00000000010D8000-memory.dmpFilesize
96KB
-
memory/1208-0-0x0000000002330000-0x0000000002363000-memory.dmpFilesize
204KB
-
memory/1208-4-0x0000000000590000-0x00000000005A3000-memory.dmpFilesize
76KB
-
memory/1208-6-0x0000000002330000-0x0000000002363000-memory.dmpFilesize
204KB