Overview
overview
10Static
static
3221b9.exe
windows10-2004-x64
102c42a36d7.exe
windows10-2004-x64
102da5f7422573.exe
windows10-2004-x64
33fcc16.exe
windows10-2004-x64
34772.exe
windows10-2004-x64
106c1a.exe
windows10-2004-x64
1079330.exe
windows10-2004-x64
10afc500c.exe
windows10-2004-x64
8ef62b5a6474.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2025, 18:44
Static task
static1
Behavioral task
behavioral1
Sample
221b9.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral2
Sample
2c42a36d7.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
2da5f7422573.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral4
Sample
3fcc16.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
4772.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral6
Sample
6c1a.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
79330.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral8
Sample
afc500c.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
ef62b5a6474.exe
Resource
win10v2004-20250217-en
General
-
Target
6c1a.exe
-
Size
2.9MB
-
MD5
2342f3d5723d354f19844400bfc63b8f
-
SHA1
535009ed27ed4364493cecd0d871c0e45505a21f
-
SHA256
b88e6baf28fcfa45e9f951160e8dc0b017218171d4c4636fb628136c2bf6c1ac
-
SHA512
1a0fc9d77d19d5fe1243e348b4a4938518e429ce92f3bbe453a9f0116fc5c21f78df6a7af24419fb45b0f5c322a0bcbf63ec7552758fccc9e92b713b4caee10a
-
SSDEEP
24576:CaiYyi79nghoOKuvA2lrCuFWzYUKcqLcVFNT7zl3Xr4cqtBCGMUSDqH5uVBDcwDM:Qoig3DFHWfypES55XtB5Yg8KdaO
Malware Config
Extracted
bitrat
1.38
62.210.11.126:9024
-
communication_password
57e9678c1972887ccb37a6296021d65d
-
tor_process
tor
Signatures
-
Bitrat family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ueegwxx = "\"C:\\Users\\Admin\\AppData\\Roaming\\Datx\\Ueegwxx.exe\"" 6c1a.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2424 InstallUtil.exe 2424 InstallUtil.exe 2424 InstallUtil.exe 2424 InstallUtil.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3784 set thread context of 2424 3784 6c1a.exe 89 -
resource yara_rule behavioral6/memory/2424-10-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral6/memory/2424-11-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral6/memory/2424-13-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral6/memory/2424-15-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral6/memory/2424-12-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral6/memory/2424-19-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral6/memory/2424-25-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral6/memory/2424-27-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral6/memory/2424-29-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral6/memory/2424-28-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral6/memory/2424-32-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral6/memory/2424-31-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral6/memory/2424-35-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral6/memory/2424-36-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral6/memory/2424-38-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral6/memory/2424-39-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6c1a.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3784 6c1a.exe Token: SeShutdownPrivilege 2424 InstallUtil.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2424 InstallUtil.exe 2424 InstallUtil.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3784 wrote to memory of 2424 3784 6c1a.exe 89 PID 3784 wrote to memory of 2424 3784 6c1a.exe 89 PID 3784 wrote to memory of 2424 3784 6c1a.exe 89 PID 3784 wrote to memory of 2424 3784 6c1a.exe 89 PID 3784 wrote to memory of 2424 3784 6c1a.exe 89 PID 3784 wrote to memory of 2424 3784 6c1a.exe 89 PID 3784 wrote to memory of 2424 3784 6c1a.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c1a.exe"C:\Users\Admin\AppData\Local\Temp\6c1a.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2424
-