Resubmissions
22-06-2024 17:36
240622-v6w45swhkc 1016-11-2023 07:55
231116-jr41nahf9v 315-11-2023 14:30
231115-rvbghsbd22 3Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-06-2024 17:36
Behavioral task
behavioral1
Sample
pikabot.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
General
-
Target
pikabot.exe
-
Size
306KB
-
MD5
a12001230dd6f5ca67f7935bcfdcd650
-
SHA1
fd39ca7366ca63f15a6e61e2cbda9195077a83b6
-
SHA256
39d6f7865949ae7bb846f56bff4f62a96d7277d2872fec68c09e1227e6db9206
-
SHA512
224d6c55953440d894d84787a88f6230964a9ec44f323dcdc49ebd9722cc5426719f36d202b586f408d0bd8d4e1502ba7edbb9037c500b1cab31242ada6bce91
-
SSDEEP
3072:engX9CnOMcKVtnEcoVzr4j0NnRT+JwMU3AWoeFE1YerPvbyg1ihk6kvtfGq0ev37:EZ7ZGVzr4jq5kJRwFE77arkR10efUKh
Malware Config
Signatures
-
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exenetstat.exepid process 1280 ipconfig.exe 708 netstat.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pikabot.exepid process 1972 pikabot.exe 1972 pikabot.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
Processes:
whoami.exenetstat.exedescription pid process Token: SeDebugPrivilege 5052 whoami.exe Token: SeDebugPrivilege 5052 whoami.exe Token: SeDebugPrivilege 5052 whoami.exe Token: SeDebugPrivilege 5052 whoami.exe Token: SeDebugPrivilege 5052 whoami.exe Token: SeDebugPrivilege 5052 whoami.exe Token: SeDebugPrivilege 5052 whoami.exe Token: SeDebugPrivilege 5052 whoami.exe Token: SeDebugPrivilege 5052 whoami.exe Token: SeDebugPrivilege 5052 whoami.exe Token: SeDebugPrivilege 5052 whoami.exe Token: SeDebugPrivilege 5052 whoami.exe Token: SeDebugPrivilege 5052 whoami.exe Token: SeDebugPrivilege 5052 whoami.exe Token: SeDebugPrivilege 5052 whoami.exe Token: SeDebugPrivilege 5052 whoami.exe Token: SeDebugPrivilege 5052 whoami.exe Token: SeDebugPrivilege 5052 whoami.exe Token: SeDebugPrivilege 5052 whoami.exe Token: SeDebugPrivilege 5052 whoami.exe Token: SeDebugPrivilege 5052 whoami.exe Token: SeDebugPrivilege 5052 whoami.exe Token: SeDebugPrivilege 5052 whoami.exe Token: SeDebugPrivilege 5052 whoami.exe Token: SeDebugPrivilege 5052 whoami.exe Token: SeDebugPrivilege 5052 whoami.exe Token: SeDebugPrivilege 5052 whoami.exe Token: SeDebugPrivilege 708 netstat.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
pikabot.exedescription pid process target process PID 1972 wrote to memory of 5052 1972 pikabot.exe whoami.exe PID 1972 wrote to memory of 5052 1972 pikabot.exe whoami.exe PID 1972 wrote to memory of 5052 1972 pikabot.exe whoami.exe PID 1972 wrote to memory of 1280 1972 pikabot.exe ipconfig.exe PID 1972 wrote to memory of 1280 1972 pikabot.exe ipconfig.exe PID 1972 wrote to memory of 1280 1972 pikabot.exe ipconfig.exe PID 1972 wrote to memory of 708 1972 pikabot.exe netstat.exe PID 1972 wrote to memory of 708 1972 pikabot.exe netstat.exe PID 1972 wrote to memory of 708 1972 pikabot.exe netstat.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\pikabot.exe"C:\Users\Admin\AppData\Local\Temp\pikabot.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\whoami.exewhoami.exe /all2⤵
- Suspicious use of AdjustPrivilegeToken
PID:5052
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig.exe /all2⤵
- Gathers network information
PID:1280
-
-
C:\Windows\SysWOW64\netstat.exenetstat.exe -aon2⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:708
-