Analysis

  • max time kernel
    143s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-07-2024 00:17

General

  • Target

    LisectAVT_2403002A_280.exe

  • Size

    1.3MB

  • MD5

    6a4b5a1fc48d7a85fe0a1ee8290e42b7

  • SHA1

    45faa50e3f66880615ddc8dba97e0cffea61a55e

  • SHA256

    2a3b2ff71f16b23e21aa9855139553509476d9f80f99d509fe0ba2c66fb9acda

  • SHA512

    e429100ccca6bd84685c6b4990c75f01f8bc1b37666706bc345c865ad66b03f01cfa0ce6c73d9262f955dc02a3230ac5b1ca6da27983cc7530fdafe4a0f6e39c

  • SSDEEP

    12288:2jwHlbKaWY6oL1T0uwJ34dW/QtQF5KXGOTBwfRzPZ15HVCjkNMOuEFcd+wtZqA8s:2yHC/QtQF5kGXZPY+1BFc2AZoyLtkwx

Malware Config

Extracted

Family

pikabot

C2

https://158.220.95.214:5243

https://64.23.199.206:1194

https://172.232.208.90:2223

https://213.199.41.33:13721

https://194.233.91.144:5000

https://158.220.95.215:5242

https://84.247.157.112:13719

Signatures

  • PikaBot

    PikaBot is a botnet that is distributed similarly to Qakbot and written in c++.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LisectAVT_2403002A_280.exe
    "C:\Users\Admin\AppData\Local\Temp\LisectAVT_2403002A_280.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of WriteProcessMemory
    PID:4496
    • C:\Windows\SysWOW64\ctfmon.exe
      "C:\Windows\SysWOW64\ctfmon.exe -p 1234"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4036-2-0x00000000003D0000-0x00000000003EA000-memory.dmp

    Filesize

    104KB

  • memory/4036-7-0x00000000003D0000-0x00000000003EA000-memory.dmp

    Filesize

    104KB

  • memory/4496-0-0x0000000000400000-0x000000000055E000-memory.dmp

    Filesize

    1.4MB

  • memory/4496-1-0x00000000023F0000-0x0000000002423000-memory.dmp

    Filesize

    204KB

  • memory/4496-13-0x0000000002360000-0x0000000002373000-memory.dmp

    Filesize

    76KB

  • memory/4496-14-0x0000000000400000-0x000000000055E000-memory.dmp

    Filesize

    1.4MB

  • memory/4496-15-0x00000000023F0000-0x0000000002423000-memory.dmp

    Filesize

    204KB