4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec

General
Target

4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe

Filesize

4MB

Completed

30-12-2021 08:04

Score
10/10
MD5

0b032e83c3a78f61fa3bf9cebd5a0242

SHA1

f39705cde333b8c104f0a0381aa85de5a9d40e23

SHA256

4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec

Malware Config

Extracted

Family bitrat
Version 1.38
C2

queentaline.ddns.net:1117

Attributes
communication_password
202cb962ac59075b964b07152d234b70
tor_process
tor
Signatures 9

Filter: none

Discovery
Persistence
  • BitRAT

    Description

    BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

  • Suspicious use of NtSetInformationThreadHideFromDebugger
    4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe

    Reported IOCs

    pidprocess
    35884dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
    35884dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
    35884dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
    35884dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
    35884dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
  • Suspicious use of SetThreadContext
    4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe

    Reported IOCs

    descriptionpidprocesstarget process
    PID 2472 set thread context of 358824724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
  • Enumerates physical storage devices

    Description

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

    TTPs

    System Information Discovery
  • Creates scheduled task(s)
    schtasks.exe

    Description

    Schtasks is often used by malware for persistence or to perform post-infection execution.

    TTPs

    Scheduled Task

    Reported IOCs

    pidprocess
    2836schtasks.exe
  • Suspicious behavior: EnumeratesProcesses
    4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exepowershell.exe

    Reported IOCs

    pidprocess
    24724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
    24724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
    24724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
    3892powershell.exe
    24724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
    24724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
    24724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
    24724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
    24724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
    24724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
    24724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
    3892powershell.exe
    3892powershell.exe
  • Suspicious use of AdjustPrivilegeToken
    4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exepowershell.exe4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe

    Reported IOCs

    descriptionpidprocess
    Token: SeDebugPrivilege24724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
    Token: SeDebugPrivilege3892powershell.exe
    Token: SeShutdownPrivilege35884dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
  • Suspicious use of SetWindowsHookEx
    4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe

    Reported IOCs

    pidprocess
    35884dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
    35884dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
  • Suspicious use of WriteProcessMemory
    4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe

    Reported IOCs

    descriptionpidprocesstarget process
    PID 2472 wrote to memory of 389224724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exepowershell.exe
    PID 2472 wrote to memory of 389224724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exepowershell.exe
    PID 2472 wrote to memory of 389224724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exepowershell.exe
    PID 2472 wrote to memory of 283624724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exeschtasks.exe
    PID 2472 wrote to memory of 283624724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exeschtasks.exe
    PID 2472 wrote to memory of 283624724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exeschtasks.exe
    PID 2472 wrote to memory of 67224724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
    PID 2472 wrote to memory of 67224724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
    PID 2472 wrote to memory of 67224724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
    PID 2472 wrote to memory of 69224724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
    PID 2472 wrote to memory of 69224724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
    PID 2472 wrote to memory of 69224724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
    PID 2472 wrote to memory of 250824724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
    PID 2472 wrote to memory of 250824724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
    PID 2472 wrote to memory of 250824724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
    PID 2472 wrote to memory of 358824724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
    PID 2472 wrote to memory of 358824724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
    PID 2472 wrote to memory of 358824724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
    PID 2472 wrote to memory of 358824724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
    PID 2472 wrote to memory of 358824724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
    PID 2472 wrote to memory of 358824724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
    PID 2472 wrote to memory of 358824724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
    PID 2472 wrote to memory of 358824724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
    PID 2472 wrote to memory of 358824724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
    PID 2472 wrote to memory of 358824724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
    PID 2472 wrote to memory of 358824724dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
Processes 7
  • C:\Users\Admin\AppData\Local\Temp\4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
    "C:\Users\Admin\AppData\Local\Temp\4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe"
    Suspicious use of SetThreadContext
    Suspicious behavior: EnumeratesProcesses
    Suspicious use of AdjustPrivilegeToken
    Suspicious use of WriteProcessMemory
    PID:2472
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\tXqdqvrsfx.exe"
      Suspicious behavior: EnumeratesProcesses
      Suspicious use of AdjustPrivilegeToken
      PID:3892
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tXqdqvrsfx" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5773.tmp"
      Creates scheduled task(s)
      PID:2836
    • C:\Users\Admin\AppData\Local\Temp\4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
      "C:\Users\Admin\AppData\Local\Temp\4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe"
      PID:672
    • C:\Users\Admin\AppData\Local\Temp\4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
      "C:\Users\Admin\AppData\Local\Temp\4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe"
      PID:692
    • C:\Users\Admin\AppData\Local\Temp\4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
      "C:\Users\Admin\AppData\Local\Temp\4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe"
      PID:2508
    • C:\Users\Admin\AppData\Local\Temp\4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe
      "C:\Users\Admin\AppData\Local\Temp\4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec.exe"
      Suspicious use of NtSetInformationThreadHideFromDebugger
      Suspicious use of AdjustPrivilegeToken
      Suspicious use of SetWindowsHookEx
      PID:3588
Network
MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Execution
            Exfiltration
              Impact
                Initial Access
                  Lateral Movement
                    Persistence
                    Privilege Escalation
                      Replay Monitor
                      00:00 00:00
                      Downloads
                      • C:\Users\Admin\AppData\Local\Temp\tmp5773.tmp

                        MD5

                        2f0fb983b8f980e5ff0abc03369227f6

                        SHA1

                        9bf20f62456cdf8f40a2038ec7f0dfae2ce7d29a

                        SHA256

                        3c6399b73106dea6208232a90fa71f145cfe92f418a0765858c54de6d00e9310

                        SHA512

                        8d11fe825a1e988dfe4b2684adecca8f9168605179e20b63453d1906cf8b4bf80e752e813d507459f0d123677ecc5071e12bb72daf5a0d9ee5c81973c08375d3

                      • memory/2472-121-0x0000000005620000-0x0000000005630000-memory.dmp

                      • memory/2472-117-0x0000000005660000-0x0000000005B5E000-memory.dmp

                      • memory/2472-118-0x0000000005160000-0x00000000051F2000-memory.dmp

                      • memory/2472-119-0x00000000050D0000-0x00000000050DA000-memory.dmp

                      • memory/2472-120-0x0000000005160000-0x000000000565E000-memory.dmp

                      • memory/2472-116-0x0000000000410000-0x000000000089E000-memory.dmp

                      • memory/2472-122-0x0000000007560000-0x00000000075FC000-memory.dmp

                      • memory/2472-123-0x0000000009260000-0x000000000978C000-memory.dmp

                      • memory/2472-115-0x0000000000410000-0x000000000089E000-memory.dmp

                      • memory/2836-125-0x0000000000000000-mapping.dmp

                      • memory/3588-135-0x000000000068A488-mapping.dmp

                      • memory/3588-133-0x0000000000400000-0x00000000007CE000-memory.dmp

                      • memory/3588-139-0x0000000000400000-0x00000000007CE000-memory.dmp

                      • memory/3892-129-0x0000000004F90000-0x0000000004FC6000-memory.dmp

                      • memory/3892-130-0x0000000007DF0000-0x0000000008418000-memory.dmp

                      • memory/3892-131-0x0000000007900000-0x0000000007922000-memory.dmp

                      • memory/3892-132-0x0000000007AA0000-0x0000000007B06000-memory.dmp

                      • memory/3892-127-0x00000000036C0000-0x00000000036C1000-memory.dmp

                      • memory/3892-134-0x0000000007CF0000-0x0000000007D56000-memory.dmp

                      • memory/3892-126-0x00000000036C0000-0x00000000036C1000-memory.dmp

                      • memory/3892-137-0x0000000008420000-0x0000000008770000-memory.dmp

                      • memory/3892-138-0x00000000077B2000-0x00000000077B3000-memory.dmp

                      • memory/3892-124-0x0000000000000000-mapping.dmp

                      • memory/3892-136-0x00000000077B0000-0x00000000077B1000-memory.dmp

                      • memory/3892-140-0x0000000007BC0000-0x0000000007BDC000-memory.dmp

                      • memory/3892-141-0x0000000008CC0000-0x0000000008D0B000-memory.dmp

                      • memory/3892-142-0x0000000008A10000-0x0000000008A86000-memory.dmp

                      • memory/3892-143-0x00000000036C0000-0x00000000036C1000-memory.dmp

                      • memory/3892-151-0x0000000007DF0000-0x0000000008418000-memory.dmp

                      • memory/3892-152-0x0000000009B60000-0x0000000009B93000-memory.dmp

                      • memory/3892-153-0x0000000009B60000-0x0000000009B93000-memory.dmp

                      • memory/3892-154-0x0000000007900000-0x0000000007922000-memory.dmp

                      • memory/3892-155-0x0000000007AA0000-0x0000000007B06000-memory.dmp

                      • memory/3892-156-0x0000000007CF0000-0x0000000007D56000-memory.dmp

                      • memory/3892-157-0x0000000008CC0000-0x0000000008D0B000-memory.dmp

                      • memory/3892-158-0x0000000008A10000-0x0000000008A86000-memory.dmp

                      • memory/3892-159-0x0000000009B40000-0x0000000009B5E000-memory.dmp

                      • memory/3892-164-0x0000000009C90000-0x0000000009D35000-memory.dmp

                      • memory/3892-165-0x0000000009E90000-0x0000000009F24000-memory.dmp

                      • memory/3892-166-0x000000007F460000-0x000000007F461000-memory.dmp

                      • memory/3892-167-0x00000000077B3000-0x00000000077B4000-memory.dmp

                      • memory/3892-360-0x0000000009E20000-0x0000000009E3A000-memory.dmp

                      • memory/3892-365-0x0000000009E20000-0x0000000009E3A000-memory.dmp

                      • memory/3892-366-0x0000000009E10000-0x0000000009E18000-memory.dmp

                      • memory/3892-371-0x0000000009E10000-0x0000000009E18000-memory.dmp