Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-04-2024 09:56

General

  • Target

    HJ.exe

  • Size

    1.4MB

  • MD5

    7a36e1ebf13b1950a75851bd95c6aabd

  • SHA1

    68684e8fa82045bef1e132e0d4d9d215d4483c8f

  • SHA256

    8eab535445ef91400fa8776ac3cef4f06c71a60832b8699db1fbccf8aacd5806

  • SHA512

    0cd409b60d982cc549a91d9c7dd2b2b78ef169e0dbb0374f384cd8240cdc2078d29b6276d20994de1bbefffe499268b8941df87f00629b30ba8727f2f786dc0c

  • SSDEEP

    24576:u3dhgAYmYqHU7pHYev00V6dCDdoVYdGp8VTALtMa6N:JmYqHU7pHYY00VcCDdowG3tMa6N

Score
10/10

Malware Config

Extracted

Family

pikabot

C2

109.199.99.131

154.38.175.241

23.226.138.143

23.226.138.161

145.239.135.24

178.18.246.136

141.95.106.106

104.129.55.105

57.128.165.176

Signatures

  • PikaBot

    PikaBot is a botnet that is distributed similarly to Qakbot and written in c++.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HJ.exe
    "C:\Users\Admin\AppData\Local\Temp\HJ.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of WriteProcessMemory
    PID:3500
    • C:\Windows\SysWOW64\ctfmon.exe
      "C:\Windows\SysWOW64\ctfmon.exe -p 1234"
      2⤵
        PID:1532
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3500 -s 492
        2⤵
        • Program crash
        PID:4828
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3500 -ip 3500
      1⤵
        PID:4008

      Network

      • flag-us
        DNS
        28.118.140.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        28.118.140.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        172.210.232.199.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        172.210.232.199.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        72.32.126.40.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        72.32.126.40.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        104.219.191.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        104.219.191.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        103.169.127.40.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        103.169.127.40.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        206.23.85.13.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        206.23.85.13.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        9.66.18.2.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        9.66.18.2.in-addr.arpa
        IN PTR
        Response
        9.66.18.2.in-addr.arpa
        IN PTR
        a2-18-66-9deploystaticakamaitechnologiescom
      • flag-us
        DNS
        218.110.86.104.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        218.110.86.104.in-addr.arpa
        IN PTR
        Response
        218.110.86.104.in-addr.arpa
        IN PTR
        a104-86-110-218deploystaticakamaitechnologiescom
      • flag-us
        DNS
        13.227.111.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        13.227.111.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        0.205.248.87.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        0.205.248.87.in-addr.arpa
        IN PTR
        Response
        0.205.248.87.in-addr.arpa
        IN PTR
        https-87-248-205-0lgwllnwnet
      • flag-us
        DNS
        11.173.189.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        11.173.189.20.in-addr.arpa
        IN PTR
        Response
      • 52.142.223.178:80
        46 B
        1
      • 89.117.23.34:5938
        ctfmon.exe
        260 B
        5
      • 37.60.242.85:9785
        ctfmon.exe
        260 B
        5
      • 52.111.243.29:443
        322 B
        7
      • 37.60.242.86:2967
        ctfmon.exe
        260 B
        5
      • 86.38.225.106:2221
        ctfmon.exe
        260 B
        5
      • 89.117.23.185:2221
        ctfmon.exe
        208 B
        4
      • 8.8.8.8:53
        28.118.140.52.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        28.118.140.52.in-addr.arpa

      • 8.8.8.8:53
        172.210.232.199.in-addr.arpa
        dns
        74 B
        128 B
        1
        1

        DNS Request

        172.210.232.199.in-addr.arpa

      • 8.8.8.8:53
        72.32.126.40.in-addr.arpa
        dns
        71 B
        157 B
        1
        1

        DNS Request

        72.32.126.40.in-addr.arpa

      • 8.8.8.8:53
        104.219.191.52.in-addr.arpa
        dns
        73 B
        147 B
        1
        1

        DNS Request

        104.219.191.52.in-addr.arpa

      • 8.8.8.8:53
        103.169.127.40.in-addr.arpa
        dns
        73 B
        147 B
        1
        1

        DNS Request

        103.169.127.40.in-addr.arpa

      • 8.8.8.8:53
        206.23.85.13.in-addr.arpa
        dns
        71 B
        145 B
        1
        1

        DNS Request

        206.23.85.13.in-addr.arpa

      • 8.8.8.8:53
        9.66.18.2.in-addr.arpa
        dns
        68 B
        129 B
        1
        1

        DNS Request

        9.66.18.2.in-addr.arpa

      • 8.8.8.8:53
        218.110.86.104.in-addr.arpa
        dns
        73 B
        139 B
        1
        1

        DNS Request

        218.110.86.104.in-addr.arpa

      • 8.8.8.8:53
        13.227.111.52.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        13.227.111.52.in-addr.arpa

      • 8.8.8.8:53
        0.205.248.87.in-addr.arpa
        dns
        71 B
        116 B
        1
        1

        DNS Request

        0.205.248.87.in-addr.arpa

      • 8.8.8.8:53
        11.173.189.20.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        11.173.189.20.in-addr.arpa

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1532-1-0x0000000000A40000-0x0000000000A59000-memory.dmp

        Filesize

        100KB

      • memory/1532-6-0x0000000000A40000-0x0000000000A59000-memory.dmp

        Filesize

        100KB

      • memory/3500-0-0x00000000007B0000-0x00000000007E3000-memory.dmp

        Filesize

        204KB

      • memory/3500-12-0x00000000007B0000-0x00000000007E3000-memory.dmp

        Filesize

        204KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.