Analysis

  • max time kernel
    148s
  • max time network
    194s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    24-06-2021 12:04

General

  • Target

    Terms and Conditions pdf.exe

  • Size

    1.1MB

  • MD5

    07d781828a2e31ae1748f114c5fe9fd5

  • SHA1

    e46c87bddf2227c583a2c9e30ee9984db82b32a2

  • SHA256

    e6df0473885248cf7c449ac57120d90c000ee847f27452a426d4bb3e7e0fee7a

  • SHA512

    43f14fb5d51f7e56a1469af96adfb7df3de06a06b58a225f020623f97d44e36f864a5b755c79dad9322edf1da3d557cc271742b77b0e5df46b3796d2003da951

Score
10/10

Malware Config

Signatures

  • BitRAT

    BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

  • BitRAT Payload 6 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Terms and Conditions pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\Terms and Conditions pdf.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1824
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zJAQFbftkdPi" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9B36.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:464
    • C:\Users\Admin\AppData\Local\Temp\Terms and Conditions pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\Terms and Conditions pdf.exe"
      2⤵
      • Loads dropped DLL
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:568
      • C:\Users\Admin\AppData\Local\Temp\sXR9Yi2ETo9Prwpe.exe
        "C:\Users\Admin\AppData\Local\Temp\sXR9Yi2ETo9Prwpe.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1396

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\sXR9Yi2ETo9Prwpe.exe
    MD5

    e39f404f193bd1e12fac9307a43adbed

    SHA1

    fb2e759fcb30b6e7299922e0e362f9b677162c94

    SHA256

    6c127e6dbd6095f50768a04c8c7edab47b372cdb4672b9c5ff2c14a44b19582a

    SHA512

    cb79c094cf29c29e113fc017a51b6f170d40f6110eb90ffade8655ac5a3dc1af4003f805bae80c52c66c9c3c70ce7652dfa34b2a3f7d5c61bd0cb196008d115b

  • C:\Users\Admin\AppData\Local\Temp\sXR9Yi2ETo9Prwpe.exe
    MD5

    e39f404f193bd1e12fac9307a43adbed

    SHA1

    fb2e759fcb30b6e7299922e0e362f9b677162c94

    SHA256

    6c127e6dbd6095f50768a04c8c7edab47b372cdb4672b9c5ff2c14a44b19582a

    SHA512

    cb79c094cf29c29e113fc017a51b6f170d40f6110eb90ffade8655ac5a3dc1af4003f805bae80c52c66c9c3c70ce7652dfa34b2a3f7d5c61bd0cb196008d115b

  • C:\Users\Admin\AppData\Local\Temp\tmp9B36.tmp
    MD5

    9e061889f37da031b2d869aef613276f

    SHA1

    2e8c9b7a44f1101c3c1c3d6771d99251c0c947db

    SHA256

    95e09c520e19fecd1444465e8b48bc7c0cd838151bb86f2405fde96cd979e0c3

    SHA512

    d3ec54d9d59b98ba7cbfaace39f355ae1f6b8061e9b26e70cfa2acdf205d33c88f9c9531588020c3a5dd5024e56a86ee2082b74e12c35e4eb5174658a1914b08

  • \Users\Admin\AppData\Local\Temp\sXR9Yi2ETo9Prwpe.exe
    MD5

    e39f404f193bd1e12fac9307a43adbed

    SHA1

    fb2e759fcb30b6e7299922e0e362f9b677162c94

    SHA256

    6c127e6dbd6095f50768a04c8c7edab47b372cdb4672b9c5ff2c14a44b19582a

    SHA512

    cb79c094cf29c29e113fc017a51b6f170d40f6110eb90ffade8655ac5a3dc1af4003f805bae80c52c66c9c3c70ce7652dfa34b2a3f7d5c61bd0cb196008d115b

  • \Users\Admin\AppData\Local\Temp\sXR9Yi2ETo9Prwpe.exe
    MD5

    e39f404f193bd1e12fac9307a43adbed

    SHA1

    fb2e759fcb30b6e7299922e0e362f9b677162c94

    SHA256

    6c127e6dbd6095f50768a04c8c7edab47b372cdb4672b9c5ff2c14a44b19582a

    SHA512

    cb79c094cf29c29e113fc017a51b6f170d40f6110eb90ffade8655ac5a3dc1af4003f805bae80c52c66c9c3c70ce7652dfa34b2a3f7d5c61bd0cb196008d115b

  • \Users\Admin\AppData\Local\Temp\sXR9Yi2ETo9Prwpe.exe
    MD5

    e39f404f193bd1e12fac9307a43adbed

    SHA1

    fb2e759fcb30b6e7299922e0e362f9b677162c94

    SHA256

    6c127e6dbd6095f50768a04c8c7edab47b372cdb4672b9c5ff2c14a44b19582a

    SHA512

    cb79c094cf29c29e113fc017a51b6f170d40f6110eb90ffade8655ac5a3dc1af4003f805bae80c52c66c9c3c70ce7652dfa34b2a3f7d5c61bd0cb196008d115b

  • \Users\Admin\AppData\Local\Temp\sXR9Yi2ETo9Prwpe.exe
    MD5

    e39f404f193bd1e12fac9307a43adbed

    SHA1

    fb2e759fcb30b6e7299922e0e362f9b677162c94

    SHA256

    6c127e6dbd6095f50768a04c8c7edab47b372cdb4672b9c5ff2c14a44b19582a

    SHA512

    cb79c094cf29c29e113fc017a51b6f170d40f6110eb90ffade8655ac5a3dc1af4003f805bae80c52c66c9c3c70ce7652dfa34b2a3f7d5c61bd0cb196008d115b

  • memory/464-66-0x0000000000000000-mapping.dmp
  • memory/568-69-0x000000000040AE9E-mapping.dmp
  • memory/568-70-0x0000000075631000-0x0000000075633000-memory.dmp
    Filesize

    8KB

  • memory/568-71-0x0000000000400000-0x000000000043F000-memory.dmp
    Filesize

    252KB

  • memory/568-68-0x0000000000400000-0x000000000043F000-memory.dmp
    Filesize

    252KB

  • memory/1396-76-0x0000000000000000-mapping.dmp
  • memory/1824-60-0x0000000000800000-0x0000000000801000-memory.dmp
    Filesize

    4KB

  • memory/1824-65-0x0000000004C10000-0x0000000004C60000-memory.dmp
    Filesize

    320KB

  • memory/1824-64-0x00000000051B0000-0x0000000005232000-memory.dmp
    Filesize

    520KB

  • memory/1824-63-0x00000000004A0000-0x00000000004B0000-memory.dmp
    Filesize

    64KB

  • memory/1824-62-0x0000000004DF0000-0x0000000004DF1000-memory.dmp
    Filesize

    4KB