Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
04-01-2022 20:11
Static task
static1
Behavioral task
behavioral1
Sample
253748ab89481d7cf40c9e52eaf28a939462b3a4e93a87215b1de4be81c69bff.exe
Resource
win10-en-20211208
General
-
Target
253748ab89481d7cf40c9e52eaf28a939462b3a4e93a87215b1de4be81c69bff.exe
-
Size
4.2MB
-
MD5
f96cc66dcb469f0c39ffa0c889bb0aee
-
SHA1
42ed3c6c969bac1c20919336db8b4325997c0474
-
SHA256
253748ab89481d7cf40c9e52eaf28a939462b3a4e93a87215b1de4be81c69bff
-
SHA512
97ea9f5d961dcb3de938a568262f757e24d6a059ce47d2aef000ab36362d67eefddbd343172227eea9dc41a8799e7ac632e19a357892f8468bf7d713a4b14b79
Malware Config
Extracted
bitrat
1.38
91.243.32.131:80
-
communication_password
202cb962ac59075b964b07152d234b70
-
install_dir
Defenderzone
-
install_file
syspro.exe
-
tor_process
tor
Signatures
-
suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
253748ab89481d7cf40c9e52eaf28a939462b3a4e93a87215b1de4be81c69bff.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\syspro = "C:\\Users\\Admin\\AppData\\Local\\Defenderzone\\syspro.exe" 253748ab89481d7cf40c9e52eaf28a939462b3a4e93a87215b1de4be81c69bff.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
Processes:
253748ab89481d7cf40c9e52eaf28a939462b3a4e93a87215b1de4be81c69bff.exepid process 2464 253748ab89481d7cf40c9e52eaf28a939462b3a4e93a87215b1de4be81c69bff.exe 2464 253748ab89481d7cf40c9e52eaf28a939462b3a4e93a87215b1de4be81c69bff.exe 2464 253748ab89481d7cf40c9e52eaf28a939462b3a4e93a87215b1de4be81c69bff.exe 2464 253748ab89481d7cf40c9e52eaf28a939462b3a4e93a87215b1de4be81c69bff.exe 2464 253748ab89481d7cf40c9e52eaf28a939462b3a4e93a87215b1de4be81c69bff.exe 2464 253748ab89481d7cf40c9e52eaf28a939462b3a4e93a87215b1de4be81c69bff.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
253748ab89481d7cf40c9e52eaf28a939462b3a4e93a87215b1de4be81c69bff.exepid process 2464 253748ab89481d7cf40c9e52eaf28a939462b3a4e93a87215b1de4be81c69bff.exe 2464 253748ab89481d7cf40c9e52eaf28a939462b3a4e93a87215b1de4be81c69bff.exe -
Suspicious behavior: RenamesItself 2 IoCs
Processes:
253748ab89481d7cf40c9e52eaf28a939462b3a4e93a87215b1de4be81c69bff.exepid process 2464 253748ab89481d7cf40c9e52eaf28a939462b3a4e93a87215b1de4be81c69bff.exe 2464 253748ab89481d7cf40c9e52eaf28a939462b3a4e93a87215b1de4be81c69bff.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
253748ab89481d7cf40c9e52eaf28a939462b3a4e93a87215b1de4be81c69bff.exedescription pid process Token: SeShutdownPrivilege 2464 253748ab89481d7cf40c9e52eaf28a939462b3a4e93a87215b1de4be81c69bff.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
253748ab89481d7cf40c9e52eaf28a939462b3a4e93a87215b1de4be81c69bff.exepid process 2464 253748ab89481d7cf40c9e52eaf28a939462b3a4e93a87215b1de4be81c69bff.exe 2464 253748ab89481d7cf40c9e52eaf28a939462b3a4e93a87215b1de4be81c69bff.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\253748ab89481d7cf40c9e52eaf28a939462b3a4e93a87215b1de4be81c69bff.exe"C:\Users\Admin\AppData\Local\Temp\253748ab89481d7cf40c9e52eaf28a939462b3a4e93a87215b1de4be81c69bff.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2464-115-0x0000000000400000-0x000000000080E000-memory.dmpFilesize
4.1MB
-
memory/2464-116-0x0000000000400000-0x000000000080E000-memory.dmpFilesize
4.1MB
-
memory/2464-117-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/2464-118-0x0000000000400000-0x000000000080E000-memory.dmpFilesize
4.1MB
-
memory/2464-119-0x0000000000400000-0x000000000080E000-memory.dmpFilesize
4.1MB
-
memory/2464-121-0x0000000000401000-0x00000000006E0000-memory.dmpFilesize
2.9MB
-
memory/2464-120-0x00000000009D0000-0x0000000000A16000-memory.dmpFilesize
280KB
-
memory/2464-122-0x0000000075D80000-0x0000000075F42000-memory.dmpFilesize
1.8MB
-
memory/2464-123-0x0000000000401000-0x00000000006E0000-memory.dmpFilesize
2.9MB
-
memory/2464-124-0x0000000000401000-0x00000000006E0000-memory.dmpFilesize
2.9MB
-
memory/2464-125-0x0000000075BF0000-0x0000000075CE1000-memory.dmpFilesize
964KB