Analysis
-
max time kernel
139s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-08-2024 11:36
Static task
static1
Behavioral task
behavioral1
Sample
filename.exe
Resource
win7-20240704-en
General
-
Target
filename.exe
-
Size
1.4MB
-
MD5
1db34920c3ae3eb8560695f89e92d930
-
SHA1
531fea122037a7b503e0fcb42aa24382a9631ac8
-
SHA256
569cf3de44279490ab8fe47d78ace6d5cbd6e6413be9d14316d31338eef12bdd
-
SHA512
b311b876c06e8d056a06991a8ebbcfd56c47a0b5d72e5f6ac94a20546f5c7bb857b143d22a09649e630d2474dfe8b7c9115b102443fe12910969f55178a74336
-
SSDEEP
24576:y0/wpWGxRsnyM3LF+0mlBnjs60nEisX1N9rm1Jo/13JQyjLc22dEaY7Unbya87CJ://wn0x3LFfmHnIZE9rm1Ji3hLc22dEa3
Malware Config
Extracted
pikabot
https://23.226.138.161:5242
https://104.156.233.235:2226
https://108.61.78.17:13719
https://103.82.243.5:13721
https://37.60.242.85:9785
https://86.38.225.106:2221
https://154.201.81.8:2967
https://104.129.55.105:2223
https://43.229.78.74:2226
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3796 set thread context of 3384 3796 filename.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language filename.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctfmon.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe 3796 filename.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3796 filename.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
pid Process 3796 filename.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3796 wrote to memory of 3384 3796 filename.exe 95 PID 3796 wrote to memory of 3384 3796 filename.exe 95 PID 3796 wrote to memory of 3384 3796 filename.exe 95 PID 3796 wrote to memory of 3384 3796 filename.exe 95 PID 3796 wrote to memory of 3384 3796 filename.exe 95 PID 3796 wrote to memory of 3384 3796 filename.exe 95 PID 3796 wrote to memory of 3384 3796 filename.exe 95 PID 3796 wrote to memory of 3384 3796 filename.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\filename.exe"C:\Users\Admin\AppData\Local\Temp\filename.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\SysWOW64\ctfmon.exe"C:\Windows\SysWOW64\ctfmon.exe -p 1234"2⤵
- System Location Discovery: System Language Discovery
PID:3384
-