Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
05-01-2022 19:41
Static task
static1
Behavioral task
behavioral1
Sample
59f5aa2f3938d9478d3275caaa5eda91.exe
Resource
win7-en-20211208
General
-
Target
59f5aa2f3938d9478d3275caaa5eda91.exe
-
Size
271KB
-
MD5
59f5aa2f3938d9478d3275caaa5eda91
-
SHA1
87fddce9bdff61168e35c09c09e04378137cfabc
-
SHA256
2bbe399540ca6bbcb26444284ed0cf85c0840a1d36c8bf3ca670be78a4975410
-
SHA512
bb9282b6f89a5d887d84bedf9a782a5c774158aa670a17bf0d532dbaf0f9b0e3f57d7ca1bc14c9de0f46de27b08fef7bd172f018fdc9108d395859f2edb8243e
Malware Config
Extracted
bitrat
1.35
storage.nsupdate.info:8973
-
communication_password
bf771c9d082071fe80b18bb678220682
-
tor_process
tor
Signatures
-
suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
-
Processes:
resource yara_rule behavioral2/memory/1500-134-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/1500-136-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/1500-137-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Drops startup file 2 IoCs
Processes:
cmd.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\59f5aa2f3938d9478d3275caaa5eda91.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\59f5aa2f3938d9478d3275caaa5eda91.exe cmd.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
59f5aa2f3938d9478d3275caaa5eda91.exepid process 1500 59f5aa2f3938d9478d3275caaa5eda91.exe 1500 59f5aa2f3938d9478d3275caaa5eda91.exe 1500 59f5aa2f3938d9478d3275caaa5eda91.exe 1500 59f5aa2f3938d9478d3275caaa5eda91.exe 1500 59f5aa2f3938d9478d3275caaa5eda91.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
59f5aa2f3938d9478d3275caaa5eda91.exedescription pid process target process PID 2652 set thread context of 1500 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 59f5aa2f3938d9478d3275caaa5eda91.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 53 IoCs
Processes:
59f5aa2f3938d9478d3275caaa5eda91.exepid process 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 2652 59f5aa2f3938d9478d3275caaa5eda91.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
59f5aa2f3938d9478d3275caaa5eda91.exe59f5aa2f3938d9478d3275caaa5eda91.exedescription pid process Token: SeDebugPrivilege 2652 59f5aa2f3938d9478d3275caaa5eda91.exe Token: SeShutdownPrivilege 1500 59f5aa2f3938d9478d3275caaa5eda91.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
59f5aa2f3938d9478d3275caaa5eda91.exepid process 1500 59f5aa2f3938d9478d3275caaa5eda91.exe 1500 59f5aa2f3938d9478d3275caaa5eda91.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
59f5aa2f3938d9478d3275caaa5eda91.exedescription pid process target process PID 2652 wrote to memory of 3260 2652 59f5aa2f3938d9478d3275caaa5eda91.exe cmd.exe PID 2652 wrote to memory of 3260 2652 59f5aa2f3938d9478d3275caaa5eda91.exe cmd.exe PID 2652 wrote to memory of 3260 2652 59f5aa2f3938d9478d3275caaa5eda91.exe cmd.exe PID 2652 wrote to memory of 508 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 59f5aa2f3938d9478d3275caaa5eda91.exe PID 2652 wrote to memory of 508 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 59f5aa2f3938d9478d3275caaa5eda91.exe PID 2652 wrote to memory of 508 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 59f5aa2f3938d9478d3275caaa5eda91.exe PID 2652 wrote to memory of 804 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 59f5aa2f3938d9478d3275caaa5eda91.exe PID 2652 wrote to memory of 804 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 59f5aa2f3938d9478d3275caaa5eda91.exe PID 2652 wrote to memory of 804 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 59f5aa2f3938d9478d3275caaa5eda91.exe PID 2652 wrote to memory of 2828 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 59f5aa2f3938d9478d3275caaa5eda91.exe PID 2652 wrote to memory of 2828 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 59f5aa2f3938d9478d3275caaa5eda91.exe PID 2652 wrote to memory of 2828 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 59f5aa2f3938d9478d3275caaa5eda91.exe PID 2652 wrote to memory of 2836 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 59f5aa2f3938d9478d3275caaa5eda91.exe PID 2652 wrote to memory of 2836 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 59f5aa2f3938d9478d3275caaa5eda91.exe PID 2652 wrote to memory of 2836 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 59f5aa2f3938d9478d3275caaa5eda91.exe PID 2652 wrote to memory of 1500 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 59f5aa2f3938d9478d3275caaa5eda91.exe PID 2652 wrote to memory of 1500 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 59f5aa2f3938d9478d3275caaa5eda91.exe PID 2652 wrote to memory of 1500 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 59f5aa2f3938d9478d3275caaa5eda91.exe PID 2652 wrote to memory of 1500 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 59f5aa2f3938d9478d3275caaa5eda91.exe PID 2652 wrote to memory of 1500 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 59f5aa2f3938d9478d3275caaa5eda91.exe PID 2652 wrote to memory of 1500 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 59f5aa2f3938d9478d3275caaa5eda91.exe PID 2652 wrote to memory of 1500 2652 59f5aa2f3938d9478d3275caaa5eda91.exe 59f5aa2f3938d9478d3275caaa5eda91.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\59f5aa2f3938d9478d3275caaa5eda91.exe"C:\Users\Admin\AppData\Local\Temp\59f5aa2f3938d9478d3275caaa5eda91.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c Copy "C:\Users\Admin\AppData\Local\Temp\59f5aa2f3938d9478d3275caaa5eda91.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\59f5aa2f3938d9478d3275caaa5eda91.exe"2⤵
- Drops startup file
-
C:\Users\Admin\AppData\Local\Temp\59f5aa2f3938d9478d3275caaa5eda91.exe"C:\Users\Admin\AppData\Local\Temp\59f5aa2f3938d9478d3275caaa5eda91.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\59f5aa2f3938d9478d3275caaa5eda91.exe"C:\Users\Admin\AppData\Local\Temp\59f5aa2f3938d9478d3275caaa5eda91.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\59f5aa2f3938d9478d3275caaa5eda91.exe"C:\Users\Admin\AppData\Local\Temp\59f5aa2f3938d9478d3275caaa5eda91.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\59f5aa2f3938d9478d3275caaa5eda91.exe"C:\Users\Admin\AppData\Local\Temp\59f5aa2f3938d9478d3275caaa5eda91.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\59f5aa2f3938d9478d3275caaa5eda91.exe"C:\Users\Admin\AppData\Local\Temp\59f5aa2f3938d9478d3275caaa5eda91.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\59f5aa2f3938d9478d3275caaa5eda91.exeMD5
59f5aa2f3938d9478d3275caaa5eda91
SHA187fddce9bdff61168e35c09c09e04378137cfabc
SHA2562bbe399540ca6bbcb26444284ed0cf85c0840a1d36c8bf3ca670be78a4975410
SHA512bb9282b6f89a5d887d84bedf9a782a5c774158aa670a17bf0d532dbaf0f9b0e3f57d7ca1bc14c9de0f46de27b08fef7bd172f018fdc9108d395859f2edb8243e
-
memory/1500-137-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1500-136-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1500-135-0x00000000007E2370-mapping.dmp
-
memory/1500-134-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/2652-120-0x00000000052C0000-0x00000000052CA000-memory.dmpFilesize
40KB
-
memory/2652-129-0x0000000006EB0000-0x0000000006EB8000-memory.dmpFilesize
32KB
-
memory/2652-122-0x0000000006640000-0x00000000066DC000-memory.dmpFilesize
624KB
-
memory/2652-116-0x00000000008D0000-0x000000000091A000-memory.dmpFilesize
296KB
-
memory/2652-124-0x0000000006850000-0x00000000068B6000-memory.dmpFilesize
408KB
-
memory/2652-115-0x00000000008D0000-0x000000000091A000-memory.dmpFilesize
296KB
-
memory/2652-126-0x00000000068C0000-0x00000000068C8000-memory.dmpFilesize
32KB
-
memory/2652-127-0x0000000006E90000-0x0000000006E98000-memory.dmpFilesize
32KB
-
memory/2652-128-0x0000000006EA0000-0x0000000006EA8000-memory.dmpFilesize
32KB
-
memory/2652-121-0x0000000006310000-0x0000000006496000-memory.dmpFilesize
1.5MB
-
memory/2652-130-0x0000000006EC0000-0x0000000006EC8000-memory.dmpFilesize
32KB
-
memory/2652-131-0x0000000006ED0000-0x0000000006ED8000-memory.dmpFilesize
32KB
-
memory/2652-132-0x0000000006EE0000-0x0000000006EE8000-memory.dmpFilesize
32KB
-
memory/2652-133-0x0000000006EF0000-0x0000000006EF8000-memory.dmpFilesize
32KB
-
memory/2652-119-0x0000000005090000-0x000000000558E000-memory.dmpFilesize
5.0MB
-
memory/2652-118-0x0000000005150000-0x00000000051E2000-memory.dmpFilesize
584KB
-
memory/2652-117-0x0000000005590000-0x0000000005A8E000-memory.dmpFilesize
5.0MB
-
memory/3260-123-0x0000000000000000-mapping.dmp