Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
20-12-2021 20:13
Static task
static1
Behavioral task
behavioral1
Sample
43e0eed9a47f0eb655af50a9aacd02b1.exe
Resource
win7-en-20211208
General
-
Target
43e0eed9a47f0eb655af50a9aacd02b1.exe
-
Size
2.0MB
-
MD5
43e0eed9a47f0eb655af50a9aacd02b1
-
SHA1
6dbc00b84c23fc44857bd81cc69fe62430bf9c82
-
SHA256
b67e1dc98007c0bf5afa9ca1f840de158cb01eedbce373d791b80059de98b011
-
SHA512
12c160f00b6a50ed84d4e3d90971cad17d67048e291210bef2e8bff8bb8acbfc18f0de26284e1f5289f9612c3efcd1659068f886404cd0e21487a9a109207f75
Malware Config
Extracted
bitrat
1.38
107.172.44.141:2030
-
communication_password
5f4dcc3b5aa765d61d8327deb882cf99
-
tor_process
tor
Signatures
-
suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
-
Processes:
resource yara_rule behavioral2/memory/1244-132-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/1244-134-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/1244-144-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
RegSvcs.exepid process 1244 RegSvcs.exe 1244 RegSvcs.exe 1244 RegSvcs.exe 1244 RegSvcs.exe 1244 RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
43e0eed9a47f0eb655af50a9aacd02b1.exedescription pid process target process PID 2736 set thread context of 1244 2736 43e0eed9a47f0eb655af50a9aacd02b1.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
43e0eed9a47f0eb655af50a9aacd02b1.exepowershell.exepid process 2736 43e0eed9a47f0eb655af50a9aacd02b1.exe 2736 43e0eed9a47f0eb655af50a9aacd02b1.exe 3540 powershell.exe 3540 powershell.exe 3540 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
43e0eed9a47f0eb655af50a9aacd02b1.exepowershell.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 2736 43e0eed9a47f0eb655af50a9aacd02b1.exe Token: SeDebugPrivilege 3540 powershell.exe Token: SeShutdownPrivilege 1244 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
RegSvcs.exepid process 1244 RegSvcs.exe 1244 RegSvcs.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
43e0eed9a47f0eb655af50a9aacd02b1.exedescription pid process target process PID 2736 wrote to memory of 3540 2736 43e0eed9a47f0eb655af50a9aacd02b1.exe powershell.exe PID 2736 wrote to memory of 3540 2736 43e0eed9a47f0eb655af50a9aacd02b1.exe powershell.exe PID 2736 wrote to memory of 3540 2736 43e0eed9a47f0eb655af50a9aacd02b1.exe powershell.exe PID 2736 wrote to memory of 4044 2736 43e0eed9a47f0eb655af50a9aacd02b1.exe schtasks.exe PID 2736 wrote to memory of 4044 2736 43e0eed9a47f0eb655af50a9aacd02b1.exe schtasks.exe PID 2736 wrote to memory of 4044 2736 43e0eed9a47f0eb655af50a9aacd02b1.exe schtasks.exe PID 2736 wrote to memory of 1912 2736 43e0eed9a47f0eb655af50a9aacd02b1.exe RegSvcs.exe PID 2736 wrote to memory of 1912 2736 43e0eed9a47f0eb655af50a9aacd02b1.exe RegSvcs.exe PID 2736 wrote to memory of 1912 2736 43e0eed9a47f0eb655af50a9aacd02b1.exe RegSvcs.exe PID 2736 wrote to memory of 1244 2736 43e0eed9a47f0eb655af50a9aacd02b1.exe RegSvcs.exe PID 2736 wrote to memory of 1244 2736 43e0eed9a47f0eb655af50a9aacd02b1.exe RegSvcs.exe PID 2736 wrote to memory of 1244 2736 43e0eed9a47f0eb655af50a9aacd02b1.exe RegSvcs.exe PID 2736 wrote to memory of 1244 2736 43e0eed9a47f0eb655af50a9aacd02b1.exe RegSvcs.exe PID 2736 wrote to memory of 1244 2736 43e0eed9a47f0eb655af50a9aacd02b1.exe RegSvcs.exe PID 2736 wrote to memory of 1244 2736 43e0eed9a47f0eb655af50a9aacd02b1.exe RegSvcs.exe PID 2736 wrote to memory of 1244 2736 43e0eed9a47f0eb655af50a9aacd02b1.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\43e0eed9a47f0eb655af50a9aacd02b1.exe"C:\Users\Admin\AppData\Local\Temp\43e0eed9a47f0eb655af50a9aacd02b1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\aDqFLFeDN.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3540
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aDqFLFeDN" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3EDA.tmp"2⤵
- Creates scheduled task(s)
PID:4044
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:1912
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1244
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
59c56295916f7c9741872d4c23ffd746
SHA19e20db52e5aa6406ca43446ffc75a17be6466885
SHA256bf4c1dbdcee250afc94b6ad07519f8b73a2854ade6ecacaef45c42d1d6209bd3
SHA512a3252e1b712a0dc91309194a7e0f1560da11940128227e8cdf21d49daa211cb4e21234241e59ecb1c30ebbba7218c3382fc48d35020e17573a0349d069363266