Analysis
-
max time kernel
133s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2024 09:56
Static task
static1
Behavioral task
behavioral1
Sample
887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe
Resource
win7-20240221-en
General
-
Target
887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe
-
Size
1.4MB
-
MD5
2677fd95e54293517c0bc79fdd108f34
-
SHA1
278e973250198ccfcd4789c8f4951e8d9fe1ff84
-
SHA256
887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798
-
SHA512
cf9a96fb75eb780b4111d48417d1d9a1373372e4a8a678a0acf1a2399d31a3d7e89b1088ab418860f95c4d1da5820c013fb94af45b2a2638b4d75ea253527de3
-
SSDEEP
24576:63dhgAYmYqHU7pHYev00V6dCDdoVYdGp8VTALtMa6L:FmYqHU7pHYY00VcCDdowG3tMa6L
Malware Config
Extracted
pikabot
109.199.99.131
154.38.175.241
23.226.138.143
23.226.138.161
145.239.135.24
178.18.246.136
141.95.106.106
104.129.55.105
57.128.165.176
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3648 set thread context of 2212 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 93 -
Program crash 1 IoCs
pid pid_target Process procid_target 3892 3648 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
pid Process 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3648 wrote to memory of 2212 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 93 PID 3648 wrote to memory of 2212 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 93 PID 3648 wrote to memory of 2212 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 93 PID 3648 wrote to memory of 2212 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 93 PID 3648 wrote to memory of 2212 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 93 PID 3648 wrote to memory of 2212 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 93 PID 3648 wrote to memory of 2212 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 93 PID 3648 wrote to memory of 2212 3648 887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe"C:\Users\Admin\AppData\Local\Temp\887594ca6a20bf67064c0f2bf0db1246ab54236df3fadb7162ac8290d40b1798.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\SysWOW64\ctfmon.exe"C:\Windows\SysWOW64\ctfmon.exe -p 1234"2⤵PID:2212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3648 -s 4962⤵
- Program crash
PID:3892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3648 -ip 36481⤵PID:2168