Analysis
-
max time kernel
141s -
max time network
134s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
05-03-2021 10:10
Static task
static1
Behavioral task
behavioral1
Sample
af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe
-
Size
3.2MB
-
MD5
d1a586b0b894c54dd7b075e5a9bbae85
-
SHA1
c77b27b7cc3bc69b867fb2527d8226030665074f
-
SHA256
af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991
-
SHA512
0adc5cf09b3d4dc0228d6dfdd46bef1b54cde2f5d533d86ba07c5970ef69e5296bf44b24daff34682a75f47e56d79da13e6927b0c220de64ef6ba4c2d71440c1
Malware Config
Signatures
-
BitRAT Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1364-7-0x0000000000400000-0x00000000007CD000-memory.dmp family_bitrat -
Drops startup file 2 IoCs
Processes:
DllHost.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\igfxME.exe DllHost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\igfxME.exe DllHost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exepid process 1364 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1364 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1364 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1364 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1364 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 42 IoCs
Processes:
af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exepid process 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exedescription pid process Token: SeShutdownPrivilege 1364 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exepid process 1364 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe 1364 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exedescription pid process target process PID 1108 wrote to memory of 1364 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe PID 1108 wrote to memory of 1364 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe PID 1108 wrote to memory of 1364 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe PID 1108 wrote to memory of 1364 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe PID 1108 wrote to memory of 1364 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe PID 1108 wrote to memory of 1364 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe PID 1108 wrote to memory of 1364 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe PID 1108 wrote to memory of 1364 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe PID 1108 wrote to memory of 1364 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe PID 1108 wrote to memory of 1364 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe PID 1108 wrote to memory of 1364 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe PID 1108 wrote to memory of 1364 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe PID 1108 wrote to memory of 1364 1108 af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe"C:\Users\Admin\AppData\Local\Temp\af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe"C:\Users\Admin\AppData\Local\Temp\af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵
- Drops startup file
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1108-2-0x0000000000C40000-0x0000000000CBB000-memory.dmpFilesize
492KB
-
memory/1108-5-0x00000000024B0000-0x000000000263E000-memory.dmpFilesize
1.6MB
-
memory/1364-3-0x0000000000000000-mapping.dmp
-
memory/1364-8-0x00000000001C0000-0x00000000001C1000-memory.dmpFilesize
4KB
-
memory/1364-7-0x0000000000400000-0x00000000007CD000-memory.dmpFilesize
3.8MB