Resubmissions

23-12-2021 11:09

211223-m84m1aadej 10

23-12-2021 08:55

211223-kvgj7sabdn 10

Analysis

  • max time kernel
    156s
  • max time network
    160s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    23-12-2021 11:09

General

  • Target

    jogb.exe

  • Size

    2.3MB

  • MD5

    cf11336d198c7034cb4e2a28c04d8898

  • SHA1

    50363fb0351f85d10faa9fd2729129f8753ab60f

  • SHA256

    892fe797710cbdda052f494e1979a339c14f96220d3d1a7c51d4f28ef47385de

  • SHA512

    a35a642a5aaa42b446b480ae63b9cddf3da4ef3720e71e65092ac36c497956cff06587da171145e53b189cb0ff10b65925e21eeb7ba15c38ad8920533099a43c

Malware Config

Signatures

  • BitRAT

    BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

  • BitRAT Payload 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\jogb.exe
    "C:\Users\Admin\AppData\Local\Temp\jogb.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:712
    • C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe
      C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3288

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/712-116-0x0000000000A20000-0x0000000000C7A000-memory.dmp

    Filesize

    2.4MB

  • memory/712-117-0x0000000000A20000-0x0000000000C7A000-memory.dmp

    Filesize

    2.4MB

  • memory/712-118-0x00000000055D0000-0x00000000055D1000-memory.dmp

    Filesize

    4KB

  • memory/712-119-0x0000000005D30000-0x0000000005F52000-memory.dmp

    Filesize

    2.1MB

  • memory/712-120-0x0000000005FC0000-0x0000000006026000-memory.dmp

    Filesize

    408KB

  • memory/712-121-0x0000000006850000-0x0000000006D4E000-memory.dmp

    Filesize

    5.0MB

  • memory/712-122-0x0000000006350000-0x000000000652C000-memory.dmp

    Filesize

    1.9MB

  • memory/3288-123-0x0000000000400000-0x00000000007CE000-memory.dmp

    Filesize

    3.8MB

  • memory/3288-126-0x0000000000400000-0x00000000007CE000-memory.dmp

    Filesize

    3.8MB