Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
12-05-2024 00:56
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
4d26e12d17a42568aa1f7d4b2f36aa3c.exe
Resource
win7-20240215-en
windows7-x64
10 signatures
150 seconds
General
-
Target
4d26e12d17a42568aa1f7d4b2f36aa3c.exe
-
Size
2.0MB
-
MD5
4d26e12d17a42568aa1f7d4b2f36aa3c
-
SHA1
c65c6120cb491c683d28cd7d913e062ca71acdf4
-
SHA256
c3bf75a13d38a48c126476948c06bdfca08ee0bb706a39c5d97f77e6c63fb8ae
-
SHA512
5dbecb961fd21062cc9fab5ea4ebb22563331bbfb6210b06ef38f9cf5620f26862f1e954659859afcc58d5fdf0a95e2ac968cb574618ae346f167c0e1909d2dd
-
SSDEEP
49152:ZTvC/MTQYxsWR7afXmpqVyBl8VaLH4QxP6Xw:ljTQYxsWR+mpqVA2YD466X
Malware Config
Extracted
Family
bitrat
Version
1.38
C2
MyBtrpub.dynuddns.com:8889
Attributes
-
communication_password
cba52b50d9cf77a308a6bedcd075f95e
-
tor_process
tor
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 10 drive.google.com 12 drive.google.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 4648 RegSvcs.exe 4648 RegSvcs.exe 4648 RegSvcs.exe 4648 RegSvcs.exe 4648 RegSvcs.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1004 set thread context of 0 1004 4d26e12d17a42568aa1f7d4b2f36aa3c.exe PID 1004 set thread context of 4648 1004 4d26e12d17a42568aa1f7d4b2f36aa3c.exe 96 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1004 4d26e12d17a42568aa1f7d4b2f36aa3c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 4648 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1004 4d26e12d17a42568aa1f7d4b2f36aa3c.exe 1004 4d26e12d17a42568aa1f7d4b2f36aa3c.exe 1004 4d26e12d17a42568aa1f7d4b2f36aa3c.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1004 4d26e12d17a42568aa1f7d4b2f36aa3c.exe 1004 4d26e12d17a42568aa1f7d4b2f36aa3c.exe 1004 4d26e12d17a42568aa1f7d4b2f36aa3c.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4648 RegSvcs.exe 4648 RegSvcs.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1004 wrote to memory of 4520 1004 4d26e12d17a42568aa1f7d4b2f36aa3c.exe 95 PID 1004 wrote to memory of 4520 1004 4d26e12d17a42568aa1f7d4b2f36aa3c.exe 95 PID 1004 wrote to memory of 4520 1004 4d26e12d17a42568aa1f7d4b2f36aa3c.exe 95 PID 1004 wrote to memory of 4520 1004 4d26e12d17a42568aa1f7d4b2f36aa3c.exe 95 PID 1004 wrote to memory of 4520 1004 4d26e12d17a42568aa1f7d4b2f36aa3c.exe 95 PID 1004 wrote to memory of 4648 1004 4d26e12d17a42568aa1f7d4b2f36aa3c.exe 96 PID 1004 wrote to memory of 4648 1004 4d26e12d17a42568aa1f7d4b2f36aa3c.exe 96 PID 1004 wrote to memory of 4648 1004 4d26e12d17a42568aa1f7d4b2f36aa3c.exe 96 PID 1004 wrote to memory of 4648 1004 4d26e12d17a42568aa1f7d4b2f36aa3c.exe 96 PID 1004 wrote to memory of 4648 1004 4d26e12d17a42568aa1f7d4b2f36aa3c.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d26e12d17a42568aa1f7d4b2f36aa3c.exe"C:\Users\Admin\AppData\Local\Temp\4d26e12d17a42568aa1f7d4b2f36aa3c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:4520
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4648
-