Analysis
-
max time kernel
1800s -
max time network
1805s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2024 09:40
Behavioral task
behavioral1
Sample
stub.exe
Resource
win7-20240221-en
windows7-x64
18 signatures
1800 seconds
Behavioral task
behavioral2
Sample
stub.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
7 signatures
1800 seconds
General
-
Target
stub.exe
-
Size
3.8MB
-
MD5
4443b57c1262fbc156765ba2a9019391
-
SHA1
b02b8b4c0ee1f8b850e420d754ef1f398c1ebf4d
-
SHA256
f6631cb0b90dad50436e54e1626d6684bb4188a451dd1168e72df5ca67583af7
-
SHA512
84e4854c82c5fbd789ce1973b73d60aef138cee9b492a693a8a9d49a24488cdc719d54a8434fdc4b8e7057be33126e09aae2f04a88d9bfbb7abb9264aa0d596d
-
SSDEEP
98304:d77Pmq33rE/JDLPWZADUGer7B6iY74M/emlwXVZ4FB:5+R/eZADUXR
Score
10/10
Malware Config
Extracted
Family
bitrat
Version
1.38
C2
103.153.182.247:6161
Attributes
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
install_dir
Install path
-
install_file
Install name
-
tor_process
tor
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Install name = "C:\\Users\\Admin\\AppData\\Local\\Install path\\Install nameȀ" stub.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Install name = "C:\\Users\\Admin\\AppData\\Local\\Install path\\Install name" stub.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local:28-03-2024 stub.exe -
Suspicious behavior: RenamesItself 64 IoCs
pid Process 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe 100 stub.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 100 stub.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 100 stub.exe 100 stub.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\stub.exe"C:\Users\Admin\AppData\Local\Temp\stub.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- NTFS ADS
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:100
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4356