Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2024 15:34
Static task
static1
Behavioral task
behavioral1
Sample
6c91b714aefef2438be04161d812403279c2da887902f9e979e83ace50dbb37a.dll
Resource
win7-20240708-en
General
-
Target
6c91b714aefef2438be04161d812403279c2da887902f9e979e83ace50dbb37a.dll
-
Size
3.6MB
-
MD5
06bf67a1a4b9688d5ea65698b9f46db4
-
SHA1
42f0a6739acc2251a7c38239258fa9b7a2fc13f0
-
SHA256
6c91b714aefef2438be04161d812403279c2da887902f9e979e83ace50dbb37a
-
SHA512
8a7e9993ee7d142cb61d1c8fd5a8e62de2869548dd612d88c78818ec038d0c8fe5b7e9c2ba175b07c00136514f8e35829cf678d8f094abf742df71294f371338
-
SSDEEP
98304:xwrMZ1Fm2dvuvPSyzxUY9TdxbfPMHFLOAkGkzdnEVomFHKnPY:xDZz+dxbfPMHFLOyomFHKnPY
Malware Config
Extracted
pikabot
https://45.76.251.190:5567
https://131.153.231.178:2221
https://95.179.135.3:2225
https://155.138.147.62:2223
https://86.38.225.109:13724
https://172.232.189.219:2224
https://198.44.187.12:2224
https://104.156.233.235:2226
https://103.82.243.5:13721
https://86.38.225.106:2221
https://45.32.248.100:2226
https://23.226.138.161:5242
https://37.60.242.85:9785
https://104.129.55.105:2223
https://45.32.21.184:5242
https://178.18.246.136:2078
https://108.61.78.17:13719
https://86.38.225.105:13721
https://172.232.189.10:1194
https://172.232.162.97:13719
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 532 set thread context of 2112 532 regsvr32.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctfmon.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 532 regsvr32.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
pid Process 532 regsvr32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1656 wrote to memory of 532 1656 regsvr32.exe 85 PID 1656 wrote to memory of 532 1656 regsvr32.exe 85 PID 1656 wrote to memory of 532 1656 regsvr32.exe 85 PID 532 wrote to memory of 2112 532 regsvr32.exe 89 PID 532 wrote to memory of 2112 532 regsvr32.exe 89 PID 532 wrote to memory of 2112 532 regsvr32.exe 89 PID 532 wrote to memory of 2112 532 regsvr32.exe 89 PID 532 wrote to memory of 2112 532 regsvr32.exe 89 PID 532 wrote to memory of 2112 532 regsvr32.exe 89 PID 532 wrote to memory of 2112 532 regsvr32.exe 89 PID 532 wrote to memory of 2112 532 regsvr32.exe 89
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\6c91b714aefef2438be04161d812403279c2da887902f9e979e83ace50dbb37a.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\6c91b714aefef2438be04161d812403279c2da887902f9e979e83ace50dbb37a.dll2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\SysWOW64\ctfmon.exe"C:\Windows\SysWOW64\ctfmon.exe -p 1234"3⤵
- System Location Discovery: System Language Discovery
PID:2112
-
-