Analysis
-
max time kernel
96s -
max time network
92s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
27-02-2021 10:22
Static task
static1
Behavioral task
behavioral1
Sample
pob.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
pob.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
Errors
Reason
Machine shutdown
General
-
Target
pob.exe
-
Size
66KB
-
MD5
083e61fc5f310a663f5253286735d36e
-
SHA1
a4f6ae6c3eaa32d21831af0d4001d44c0c2f7083
-
SHA256
2a2ce0aca043486b9b1995b262cd4611b1376fc4b18440d7d4b3ee8cfff2c76a
-
SHA512
32ea2de1f5e195efb1aad00b9812eda6ee962bd0e3146d813b630e614a6c8d4b363ee1eaba3b610d63852a1b4e6cf7036bc7ac99be959cf215d61389f8caf82f
Malware Config
Signatures
-
BitRAT Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1500-9-0x0000000000400000-0x00000000007CD000-memory.dmp family_bitrat behavioral1/memory/1500-10-0x0000000000689A84-mapping.dmp family_bitrat behavioral1/memory/1500-12-0x0000000000400000-0x00000000007CD000-memory.dmp family_bitrat -
Beds Protector Packer 1 IoCs
Detects Beds Protector packer used to load .NET malware.
Processes:
resource yara_rule behavioral1/memory/1724-6-0x0000000006210000-0x0000000006403000-memory.dmp beds_protector -
Drops startup file 2 IoCs
Processes:
pob.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\pob.exe pob.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\pob.exe pob.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
pob.exepid process 1500 pob.exe 1500 pob.exe 1500 pob.exe 1500 pob.exe 1500 pob.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
pob.exedescription pid process target process PID 1724 set thread context of 1500 1724 pob.exe pob.exe -
NTFS ADS 1 IoCs
Processes:
pob.exedescription ioc process File created C:\Users\Admin\AppData\Local:27-02-2021 pob.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
pob.exetaskmgr.exepid process 1724 pob.exe 1724 pob.exe 1724 pob.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 904 taskmgr.exe 904 taskmgr.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 1724 pob.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskmgr.exepid process 904 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
pob.exetaskmgr.exepob.exeAUDIODG.EXEdescription pid process Token: SeDebugPrivilege 1724 pob.exe Token: SeDebugPrivilege 904 taskmgr.exe Token: SeDebugPrivilege 1500 pob.exe Token: SeShutdownPrivilege 1500 pob.exe Token: 33 1492 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1492 AUDIODG.EXE Token: 33 1492 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1492 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exepid process 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exepid process 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
pob.exepid process 1500 pob.exe 1500 pob.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
pob.exedescription pid process target process PID 1724 wrote to memory of 1500 1724 pob.exe pob.exe PID 1724 wrote to memory of 1500 1724 pob.exe pob.exe PID 1724 wrote to memory of 1500 1724 pob.exe pob.exe PID 1724 wrote to memory of 1500 1724 pob.exe pob.exe PID 1724 wrote to memory of 1500 1724 pob.exe pob.exe PID 1724 wrote to memory of 1500 1724 pob.exe pob.exe PID 1724 wrote to memory of 1500 1724 pob.exe pob.exe PID 1724 wrote to memory of 1500 1724 pob.exe pob.exe PID 1724 wrote to memory of 1500 1724 pob.exe pob.exe PID 1724 wrote to memory of 1500 1724 pob.exe pob.exe PID 1724 wrote to memory of 1500 1724 pob.exe pob.exe PID 1724 wrote to memory of 1500 1724 pob.exe pob.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\pob.exe"C:\Users\Admin\AppData\Local\Temp\pob.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\pob.exe"C:\Users\Admin\AppData\Local\Temp\pob.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5641⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/660-17-0x000007FEF7D90000-0x000007FEF800A000-memory.dmpFilesize
2.5MB
-
memory/904-7-0x000007FEFC601000-0x000007FEFC603000-memory.dmpFilesize
8KB
-
memory/1500-11-0x00000000761E1000-0x00000000761E3000-memory.dmpFilesize
8KB
-
memory/1500-12-0x0000000000400000-0x00000000007CD000-memory.dmpFilesize
3.8MB
-
memory/1500-15-0x0000000000260000-0x0000000000261000-memory.dmpFilesize
4KB
-
memory/1500-14-0x0000000000260000-0x0000000000261000-memory.dmpFilesize
4KB
-
memory/1500-9-0x0000000000400000-0x00000000007CD000-memory.dmpFilesize
3.8MB
-
memory/1500-10-0x0000000000689A84-mapping.dmp
-
memory/1500-13-0x0000000000260000-0x0000000000261000-memory.dmpFilesize
4KB
-
memory/1660-21-0x0000000002920000-0x0000000002921000-memory.dmpFilesize
4KB
-
memory/1668-19-0x00000000028C0000-0x00000000028C1000-memory.dmpFilesize
4KB
-
memory/1724-6-0x0000000006210000-0x0000000006403000-memory.dmpFilesize
1.9MB
-
memory/1724-2-0x0000000074D20000-0x000000007540E000-memory.dmpFilesize
6.9MB
-
memory/1724-8-0x0000000000320000-0x0000000000321000-memory.dmpFilesize
4KB
-
memory/1724-5-0x0000000004910000-0x0000000004911000-memory.dmpFilesize
4KB
-
memory/1724-3-0x0000000001000000-0x0000000001001000-memory.dmpFilesize
4KB