Resubmissions
18-04-2024 08:49
240418-krfthagd74 1018-04-2024 08:48
240418-kqsrnsgd65 1018-04-2024 08:48
240418-kqr55shg3z 1018-04-2024 08:48
240418-kqmwesgd62 1018-04-2024 08:48
240418-kqmknahg3w 10Analysis
-
max time kernel
150s -
max time network
132s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
15-06-2021 12:53
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe
Resource
win7v20210410
General
-
Target
SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe
-
Size
1.4MB
-
MD5
793707365df26450bc8642f518a540f0
-
SHA1
66649127ad784288c393992971a197c10f86a8eb
-
SHA256
7131d78da58eb6b54db8466e0c09d7173da6f05c5615841a73dc6a032648a217
-
SHA512
550374f2b3963e99bbfa445236e2921d288e67e00b4425a3bfedba0b72bd2fe6027af484c8f7e143471e16738dd9f129c91e467e157e29a911f1ad44d2775695
Malware Config
Signatures
-
Nirsoft 3 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\{4CDEEA8A-4AE5-42DE-AB09-BD4527C1808D}\1991806312.exe Nirsoft \Users\Admin\AppData\Local\Temp\{4CDEEA8A-4AE5-42DE-AB09-BD4527C1808D}\1991806312.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\{4CDEEA8A-4AE5-42DE-AB09-BD4527C1808D}\1991806312.exe Nirsoft -
Executes dropped EXE 3 IoCs
Processes:
cmd.exeGetX64BTIT.exe1991806312.exepid process 748 cmd.exe 1600 GetX64BTIT.exe 1244 1991806312.exe -
Loads dropped DLL 4 IoCs
Processes:
ipconfig.execmd.exepid process 2016 ipconfig.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 14 api.ipify.org 15 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 1 IoCs
Processes:
cmd.exedescription ioc process File created C:\Windows\Tasks\lvp.job cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 2016 ipconfig.exe -
Processes:
cmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\IntelliForms\Storage2 cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exeipconfig.execmd.exepid process 1208 SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe 2016 ipconfig.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe 748 cmd.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
ipconfig.exepid process 2016 ipconfig.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
cmd.exepid process 748 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exeipconfig.exedescription pid process target process PID 1208 wrote to memory of 2016 1208 SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe ipconfig.exe PID 1208 wrote to memory of 2016 1208 SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe ipconfig.exe PID 1208 wrote to memory of 2016 1208 SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe ipconfig.exe PID 1208 wrote to memory of 2016 1208 SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe ipconfig.exe PID 1208 wrote to memory of 2016 1208 SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe ipconfig.exe PID 1208 wrote to memory of 2016 1208 SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe ipconfig.exe PID 1208 wrote to memory of 2016 1208 SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe ipconfig.exe PID 1208 wrote to memory of 2016 1208 SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe ipconfig.exe PID 1208 wrote to memory of 2016 1208 SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe ipconfig.exe PID 1208 wrote to memory of 2016 1208 SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe ipconfig.exe PID 1208 wrote to memory of 2016 1208 SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe ipconfig.exe PID 1208 wrote to memory of 2016 1208 SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe ipconfig.exe PID 1208 wrote to memory of 2016 1208 SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe ipconfig.exe PID 1208 wrote to memory of 2016 1208 SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe ipconfig.exe PID 1208 wrote to memory of 2016 1208 SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe ipconfig.exe PID 1208 wrote to memory of 2016 1208 SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe ipconfig.exe PID 1208 wrote to memory of 2016 1208 SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe ipconfig.exe PID 1208 wrote to memory of 2016 1208 SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe ipconfig.exe PID 1208 wrote to memory of 2016 1208 SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe ipconfig.exe PID 1208 wrote to memory of 2016 1208 SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe ipconfig.exe PID 1208 wrote to memory of 2016 1208 SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe ipconfig.exe PID 1208 wrote to memory of 2016 1208 SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe ipconfig.exe PID 1208 wrote to memory of 2016 1208 SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe ipconfig.exe PID 1208 wrote to memory of 2016 1208 SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe ipconfig.exe PID 1208 wrote to memory of 2016 1208 SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe ipconfig.exe PID 1208 wrote to memory of 2016 1208 SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe ipconfig.exe PID 1208 wrote to memory of 2016 1208 SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe ipconfig.exe PID 1208 wrote to memory of 2016 1208 SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe ipconfig.exe PID 1208 wrote to memory of 2016 1208 SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe ipconfig.exe PID 1208 wrote to memory of 2016 1208 SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe ipconfig.exe PID 1208 wrote to memory of 2016 1208 SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe ipconfig.exe PID 1208 wrote to memory of 2016 1208 SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe ipconfig.exe PID 1208 wrote to memory of 2016 1208 SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe ipconfig.exe PID 1208 wrote to memory of 2016 1208 SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe ipconfig.exe PID 2016 wrote to memory of 748 2016 ipconfig.exe cmd.exe PID 2016 wrote to memory of 748 2016 ipconfig.exe cmd.exe PID 2016 wrote to memory of 748 2016 ipconfig.exe cmd.exe PID 2016 wrote to memory of 748 2016 ipconfig.exe cmd.exe PID 2016 wrote to memory of 748 2016 ipconfig.exe cmd.exe PID 2016 wrote to memory of 748 2016 ipconfig.exe cmd.exe PID 2016 wrote to memory of 748 2016 ipconfig.exe cmd.exe PID 2016 wrote to memory of 748 2016 ipconfig.exe cmd.exe PID 2016 wrote to memory of 748 2016 ipconfig.exe cmd.exe PID 2016 wrote to memory of 748 2016 ipconfig.exe cmd.exe PID 2016 wrote to memory of 748 2016 ipconfig.exe cmd.exe PID 2016 wrote to memory of 748 2016 ipconfig.exe cmd.exe PID 2016 wrote to memory of 748 2016 ipconfig.exe cmd.exe PID 2016 wrote to memory of 748 2016 ipconfig.exe cmd.exe PID 2016 wrote to memory of 748 2016 ipconfig.exe cmd.exe PID 2016 wrote to memory of 748 2016 ipconfig.exe cmd.exe PID 2016 wrote to memory of 748 2016 ipconfig.exe cmd.exe PID 2016 wrote to memory of 748 2016 ipconfig.exe cmd.exe PID 2016 wrote to memory of 748 2016 ipconfig.exe cmd.exe PID 2016 wrote to memory of 748 2016 ipconfig.exe cmd.exe PID 2016 wrote to memory of 748 2016 ipconfig.exe cmd.exe PID 2016 wrote to memory of 748 2016 ipconfig.exe cmd.exe PID 2016 wrote to memory of 748 2016 ipconfig.exe cmd.exe PID 2016 wrote to memory of 748 2016 ipconfig.exe cmd.exe PID 2016 wrote to memory of 748 2016 ipconfig.exe cmd.exe PID 2016 wrote to memory of 748 2016 ipconfig.exe cmd.exe PID 2016 wrote to memory of 748 2016 ipconfig.exe cmd.exe PID 2016 wrote to memory of 748 2016 ipconfig.exe cmd.exe PID 2016 wrote to memory of 748 2016 ipconfig.exe cmd.exe PID 2016 wrote to memory of 748 2016 ipconfig.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BackDoor.Rat.281.18292.12946.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe"2⤵
- Loads dropped DLL
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\cmd.exe"C:\Users\Admin\AppData\Local\Temp\cmd.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\{4CDEEA8A-4AE5-42DE-AB09-BD4527C1808D}\1991806312.exeC:\Users\Admin\AppData\Local\Temp\{4CDEEA8A-4AE5-42DE-AB09-BD4527C1808D}\1991806312.exe /sjson C:\Users\Admin\AppData\Local\Temp\{4CDEEA8A-4AE5-42DE-AB09-BD4527C1808D}\book.json4⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exeMD5
b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
C:\Users\Admin\AppData\Local\Temp\cmd.exeMD5
ad7b9c14083b52bc532fba5948342b98
SHA1ee8cbf12d87c4d388f09b4f69bed2e91682920b5
SHA25617f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae
SHA512e12aad20c824187b39edb3c7943709290b5ddbf1b4032988db46f2e86da3cf7e7783f78c82e4dc5da232f666b8f9799a260a1f8e2694eb4d0cdaf78da710fde1
-
C:\Users\Admin\AppData\Local\Temp\x64btit.txtMD5
92d10117b36a02cd37bf926cbfd2cb21
SHA1508c0d9f675fd6923c71de8844febae45d257e34
SHA256859cc85cd2af5f2cdab1415cdbf7f1d7bcd01bb94cd34188cf00e3b62cc438be
SHA5121ac24c7d7333cbfb4d45b3f1bfff16fb9813ddfa1519be6186c7d95d9827fa60c1b3d8c63a6cefefa3133b36539a1d8c098821e72c651ec3bd86fa31b593cf58
-
C:\Users\Admin\AppData\Local\Temp\{4CDEEA8A-4AE5-42DE-AB09-BD4527C1808D}\1991806312.exeMD5
b94350c5a57401721ce013c1a76c2727
SHA1f0e946cf41e3c11d7f84736a365ec3d0b173fef4
SHA256e6f88219fde1d526253de53f06fdb95ad08704c4dedbcdcf062d09db69754a58
SHA5120b3622a799f46bf3023a7ff0afde855261f2cc1a42b19c625f17333b480bd90eddb20f61a436724065c9b5372c4beee66366bfd6f3dd5aacfb5bbaa73a022193
-
C:\Users\Admin\AppData\Local\Temp\{4CDEEA8A-4AE5-42DE-AB09-BD4527C1808D}\book.jsonMD5
f3a55ae79aa1a18000ccac4d16761dcd
SHA17e2cf5c2a7147b4b172bd9347bbf45aca6beb0f3
SHA256a77561badbf13eef0e2b0d278d81d7847bfa26c8f3765c2fb798ab4187675575
SHA5125184cb5cc3278cccf387e7e576587fa33c87d62df1249d20542257443fb36ca67a71f63775c241dcb982542abfcb0918d29edc333addb234b0a46db29fd5c168
-
\Users\Admin\AppData\Local\Temp\GetX64BTIT.exeMD5
b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
\Users\Admin\AppData\Local\Temp\cmd.exeMD5
ad7b9c14083b52bc532fba5948342b98
SHA1ee8cbf12d87c4d388f09b4f69bed2e91682920b5
SHA25617f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae
SHA512e12aad20c824187b39edb3c7943709290b5ddbf1b4032988db46f2e86da3cf7e7783f78c82e4dc5da232f666b8f9799a260a1f8e2694eb4d0cdaf78da710fde1
-
\Users\Admin\AppData\Local\Temp\{4CDEEA8A-4AE5-42DE-AB09-BD4527C1808D}\1991806312.exeMD5
b94350c5a57401721ce013c1a76c2727
SHA1f0e946cf41e3c11d7f84736a365ec3d0b173fef4
SHA256e6f88219fde1d526253de53f06fdb95ad08704c4dedbcdcf062d09db69754a58
SHA5120b3622a799f46bf3023a7ff0afde855261f2cc1a42b19c625f17333b480bd90eddb20f61a436724065c9b5372c4beee66366bfd6f3dd5aacfb5bbaa73a022193
-
\Users\Admin\AppData\Local\Temp\{4CDEEA8A-4AE5-42DE-AB09-BD4527C1808D}\1991806312.exeMD5
b94350c5a57401721ce013c1a76c2727
SHA1f0e946cf41e3c11d7f84736a365ec3d0b173fef4
SHA256e6f88219fde1d526253de53f06fdb95ad08704c4dedbcdcf062d09db69754a58
SHA5120b3622a799f46bf3023a7ff0afde855261f2cc1a42b19c625f17333b480bd90eddb20f61a436724065c9b5372c4beee66366bfd6f3dd5aacfb5bbaa73a022193
-
memory/748-72-0x0000000077001000-0x000000007710127A-memory.dmpFilesize
1.0MB
-
memory/748-67-0x0000000000000000-mapping.dmp
-
memory/748-71-0x0000000000090000-0x0000000000097000-memory.dmpFilesize
28KB
-
memory/748-70-0x0000000077000000-0x00000000771A9000-memory.dmpFilesize
1.7MB
-
memory/748-76-0x0000000000400000-0x000000000049F000-memory.dmpFilesize
636KB
-
memory/1208-62-0x00000000002F0000-0x00000000002F9000-memory.dmpFilesize
36KB
-
memory/1208-61-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/1244-83-0x0000000000000000-mapping.dmp
-
memory/1244-86-0x0000000072421000-0x0000000072423000-memory.dmpFilesize
8KB
-
memory/1600-78-0x0000000000000000-mapping.dmp
-
memory/2016-65-0x0000000077000000-0x00000000771A9000-memory.dmpFilesize
1.7MB
-
memory/2016-64-0x00000000005D0000-0x0000000000605000-memory.dmpFilesize
212KB
-
memory/2016-59-0x0000000000000000-mapping.dmp
-
memory/2016-63-0x0000000000090000-0x0000000000092000-memory.dmpFilesize
8KB
-
memory/2016-60-0x0000000075561000-0x0000000075563000-memory.dmpFilesize
8KB