Resubmissions
22-06-2024 17:36
240622-v6w45swhkc 1016-11-2023 07:55
231116-jr41nahf9v 315-11-2023 14:30
231115-rvbghsbd22 3Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22-06-2024 17:36
Behavioral task
behavioral1
Sample
pikabot.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
General
-
Target
pikabot.exe
-
Size
306KB
-
MD5
a12001230dd6f5ca67f7935bcfdcd650
-
SHA1
fd39ca7366ca63f15a6e61e2cbda9195077a83b6
-
SHA256
39d6f7865949ae7bb846f56bff4f62a96d7277d2872fec68c09e1227e6db9206
-
SHA512
224d6c55953440d894d84787a88f6230964a9ec44f323dcdc49ebd9722cc5426719f36d202b586f408d0bd8d4e1502ba7edbb9037c500b1cab31242ada6bce91
-
SSDEEP
3072:engX9CnOMcKVtnEcoVzr4j0NnRT+JwMU3AWoeFE1YerPvbyg1ihk6kvtfGq0ev37:EZ7ZGVzr4jq5kJRwFE77arkR10efUKh
Malware Config
Signatures
-
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exenetstat.exepid process 1736 ipconfig.exe 1928 netstat.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
pikabot.exepid process 944 pikabot.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
whoami.exenetstat.exedescription pid process Token: SeDebugPrivilege 2460 whoami.exe Token: SeDebugPrivilege 2460 whoami.exe Token: SeDebugPrivilege 2460 whoami.exe Token: SeDebugPrivilege 2460 whoami.exe Token: SeDebugPrivilege 2460 whoami.exe Token: SeDebugPrivilege 2460 whoami.exe Token: SeDebugPrivilege 2460 whoami.exe Token: SeDebugPrivilege 2460 whoami.exe Token: SeDebugPrivilege 2460 whoami.exe Token: SeDebugPrivilege 2460 whoami.exe Token: SeDebugPrivilege 2460 whoami.exe Token: SeDebugPrivilege 2460 whoami.exe Token: SeDebugPrivilege 2460 whoami.exe Token: SeDebugPrivilege 2460 whoami.exe Token: SeDebugPrivilege 2460 whoami.exe Token: SeDebugPrivilege 2460 whoami.exe Token: SeDebugPrivilege 2460 whoami.exe Token: SeDebugPrivilege 2460 whoami.exe Token: SeDebugPrivilege 2460 whoami.exe Token: SeDebugPrivilege 2460 whoami.exe Token: SeDebugPrivilege 2460 whoami.exe Token: SeDebugPrivilege 2460 whoami.exe Token: SeDebugPrivilege 2460 whoami.exe Token: SeDebugPrivilege 1928 netstat.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
pikabot.exedescription pid process target process PID 944 wrote to memory of 2460 944 pikabot.exe whoami.exe PID 944 wrote to memory of 2460 944 pikabot.exe whoami.exe PID 944 wrote to memory of 2460 944 pikabot.exe whoami.exe PID 944 wrote to memory of 2460 944 pikabot.exe whoami.exe PID 944 wrote to memory of 1736 944 pikabot.exe ipconfig.exe PID 944 wrote to memory of 1736 944 pikabot.exe ipconfig.exe PID 944 wrote to memory of 1736 944 pikabot.exe ipconfig.exe PID 944 wrote to memory of 1736 944 pikabot.exe ipconfig.exe PID 944 wrote to memory of 1928 944 pikabot.exe netstat.exe PID 944 wrote to memory of 1928 944 pikabot.exe netstat.exe PID 944 wrote to memory of 1928 944 pikabot.exe netstat.exe PID 944 wrote to memory of 1928 944 pikabot.exe netstat.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\pikabot.exe"C:\Users\Admin\AppData\Local\Temp\pikabot.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\whoami.exewhoami.exe /all2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2460
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig.exe /all2⤵
- Gathers network information
PID:1736
-
-
C:\Windows\SysWOW64\netstat.exenetstat.exe -aon2⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:1928
-