Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    07-01-2022 00:25

General

  • Target

    Order_2190034_January.exe

  • Size

    785KB

  • MD5

    751cfacd6de472704d072d56cd27769e

  • SHA1

    733fd283e27fedb060e4b841f4737a28ba126600

  • SHA256

    1df11ec4ef8cfeda563e1103d5e0cdc4ed10601b37e0ea9f93be82433ab68c72

  • SHA512

    b036ad1a18b920fe56686d6a8b699286dc646bf992823617b73b1f7bae7197ffe1ebc80999a861cab92bf97fcb6855cdcef061d8bf5a27631179b467ffec2d39

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

severdops.ddns.net:3071

Attributes
  • communication_password

    29ef52e7563626a96cea7f4b4085c124

  • tor_process

    tor

Signatures

  • BitRAT

    BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

  • Windows security bypass 2 TTPs
  • suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)

    suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Uses the VBS compiler for execution 1 TTPs
  • Windows security modification 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Order_2190034_January.exe
    "C:\Users\Admin\AppData\Local\Temp\Order_2190034_January.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3584
    • C:\Users\Admin\AppData\Local\Temp\Order_2190034_January.exe
      "C:\Users\Admin\AppData\Local\Temp\Order_2190034_January.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4512
      • C:\Users\Admin\AppData\Local\Temp\c39y8wmgrNQPnHN3.exe
        "C:\Users\Admin\AppData\Local\Temp\c39y8wmgrNQPnHN3.exe"
        3⤵
        • Executes dropped EXE
        • Windows security modification
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4404
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Microsoft.NET\Framework\GLOSSERSECC\svchost.exe" -Force
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1036
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Microsoft.NET\Framework\GLOSSERSECC\svchost.exe" -Force
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1268
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\c39y8wmgrNQPnHN3.exe" -Force
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1476
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe"
          4⤵
            PID:4932
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
            4⤵
              PID:4968
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
              4⤵
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:4996

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Scripting

      1
      T1064

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Disabling Security Tools

      2
      T1089

      Modify Registry

      3
      T1112

      Scripting

      1
      T1064

      Discovery

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
        MD5

        1c19c16e21c97ed42d5beabc93391fc5

        SHA1

        8ad83f8e0b3acf8dfbbf87931e41f0d664c4df68

        SHA256

        1bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05

        SHA512

        7d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
        MD5

        34cbce7a86066983ddec1c5c7316fa24

        SHA1

        a1135a1ddbfd3ae8079f7e449d7978fdb92f3bd9

        SHA256

        23bf6d99f757f6728c8c896676b0707e190e1acb80ec8758696fa3efa8d6cb42

        SHA512

        f6537a61341ef316200de61d4185d7fdf8169fa5f01446241d34dc74ffdf9edfd520c5d06d54c9df8a8d1eb0eeab53141d75c88f157b72cbcb6b7f0bdb84e769

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
        MD5

        34cbce7a86066983ddec1c5c7316fa24

        SHA1

        a1135a1ddbfd3ae8079f7e449d7978fdb92f3bd9

        SHA256

        23bf6d99f757f6728c8c896676b0707e190e1acb80ec8758696fa3efa8d6cb42

        SHA512

        f6537a61341ef316200de61d4185d7fdf8169fa5f01446241d34dc74ffdf9edfd520c5d06d54c9df8a8d1eb0eeab53141d75c88f157b72cbcb6b7f0bdb84e769

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        MD5

        517b8cd4a0d104ab2b123efc69b61f67

        SHA1

        42568547c88f9e3ffc709dba342052f7c12f1a0a

        SHA256

        b03a03151bcbbdc544eae3b109417d0f1cbd1db8b0d6a28bbbe210b9e88dded1

        SHA512

        cd28742a25557e2fdf81f8b15e57054d65039dee45af02081844cac4b8ee842ceb94fa0838990f9255759b701b4b0df2160248b4f8b6280bcc51395dbd225355

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        MD5

        517b8cd4a0d104ab2b123efc69b61f67

        SHA1

        42568547c88f9e3ffc709dba342052f7c12f1a0a

        SHA256

        b03a03151bcbbdc544eae3b109417d0f1cbd1db8b0d6a28bbbe210b9e88dded1

        SHA512

        cd28742a25557e2fdf81f8b15e57054d65039dee45af02081844cac4b8ee842ceb94fa0838990f9255759b701b4b0df2160248b4f8b6280bcc51395dbd225355

      • C:\Users\Admin\AppData\Local\Temp\c39y8wmgrNQPnHN3.exe
        MD5

        0a7dba172f5485536a67007bbb67f209

        SHA1

        7352fbbee9419e6afe958bfd34d55ffafeda0d58

        SHA256

        f10d43cfd07a986f1f3c75eb7c90af7e1d841530709f8dcac64bfbfcb53ec736

        SHA512

        6f2c94a396ed78e925c0d3dd6926498a7ba78bb5a111287b5c0b1122681e196fc526496a433e5b3b431988a5d6eb75218d0b5c814971163dbc489193454d14ba

      • C:\Users\Admin\AppData\Local\Temp\c39y8wmgrNQPnHN3.exe
        MD5

        0a7dba172f5485536a67007bbb67f209

        SHA1

        7352fbbee9419e6afe958bfd34d55ffafeda0d58

        SHA256

        f10d43cfd07a986f1f3c75eb7c90af7e1d841530709f8dcac64bfbfcb53ec736

        SHA512

        6f2c94a396ed78e925c0d3dd6926498a7ba78bb5a111287b5c0b1122681e196fc526496a433e5b3b431988a5d6eb75218d0b5c814971163dbc489193454d14ba

      • memory/1036-179-0x0000000008C10000-0x0000000008C5B000-memory.dmp
        Filesize

        300KB

      • memory/1036-168-0x00000000082E0000-0x0000000008630000-memory.dmp
        Filesize

        3.3MB

      • memory/1036-215-0x0000000009AC0000-0x0000000009AF3000-memory.dmp
        Filesize

        204KB

      • memory/1036-191-0x00000000031B0000-0x00000000031B1000-memory.dmp
        Filesize

        4KB

      • memory/1036-183-0x00000000089F0000-0x0000000008A66000-memory.dmp
        Filesize

        472KB

      • memory/1036-141-0x0000000000000000-mapping.dmp
      • memory/1036-176-0x0000000008280000-0x000000000829C000-memory.dmp
        Filesize

        112KB

      • memory/1036-219-0x0000000009AC0000-0x0000000009AF3000-memory.dmp
        Filesize

        204KB

      • memory/1036-213-0x0000000007970000-0x0000000007F98000-memory.dmp
        Filesize

        6.2MB

      • memory/1036-221-0x0000000007940000-0x0000000007962000-memory.dmp
        Filesize

        136KB

      • memory/1036-170-0x0000000007330000-0x0000000007331000-memory.dmp
        Filesize

        4KB

      • memory/1036-173-0x0000000007332000-0x0000000007333000-memory.dmp
        Filesize

        4KB

      • memory/1036-164-0x0000000008080000-0x00000000080E6000-memory.dmp
        Filesize

        408KB

      • memory/1036-161-0x0000000008010000-0x0000000008076000-memory.dmp
        Filesize

        408KB

      • memory/1036-160-0x0000000007940000-0x0000000007962000-memory.dmp
        Filesize

        136KB

      • memory/1036-155-0x0000000007970000-0x0000000007F98000-memory.dmp
        Filesize

        6.2MB

      • memory/1036-144-0x00000000031B0000-0x00000000031B1000-memory.dmp
        Filesize

        4KB

      • memory/1036-151-0x0000000007220000-0x0000000007256000-memory.dmp
        Filesize

        216KB

      • memory/1036-148-0x00000000031B0000-0x00000000031B1000-memory.dmp
        Filesize

        4KB

      • memory/1268-180-0x00000000077E0000-0x00000000077FC000-memory.dmp
        Filesize

        112KB

      • memory/1268-159-0x0000000006E40000-0x0000000006E62000-memory.dmp
        Filesize

        136KB

      • memory/1268-190-0x0000000000EE0000-0x0000000000EE1000-memory.dmp
        Filesize

        4KB

      • memory/1268-145-0x0000000000EE0000-0x0000000000EE1000-memory.dmp
        Filesize

        4KB

      • memory/1268-188-0x0000000007FB0000-0x0000000008026000-memory.dmp
        Filesize

        472KB

      • memory/1268-181-0x0000000008200000-0x000000000824B000-memory.dmp
        Filesize

        300KB

      • memory/1268-142-0x0000000000000000-mapping.dmp
      • memory/1268-172-0x0000000006B22000-0x0000000006B23000-memory.dmp
        Filesize

        4KB

      • memory/1268-149-0x00000000044F0000-0x0000000004526000-memory.dmp
        Filesize

        216KB

      • memory/1268-171-0x0000000007900000-0x0000000007C50000-memory.dmp
        Filesize

        3.3MB

      • memory/1268-166-0x0000000006FE0000-0x0000000007046000-memory.dmp
        Filesize

        408KB

      • memory/1268-146-0x0000000000EE0000-0x0000000000EE1000-memory.dmp
        Filesize

        4KB

      • memory/1268-167-0x0000000006B20000-0x0000000006B21000-memory.dmp
        Filesize

        4KB

      • memory/1268-162-0x0000000007800000-0x0000000007866000-memory.dmp
        Filesize

        408KB

      • memory/1268-156-0x0000000007160000-0x0000000007788000-memory.dmp
        Filesize

        6.2MB

      • memory/1476-175-0x0000000006AA2000-0x0000000006AA3000-memory.dmp
        Filesize

        4KB

      • memory/1476-220-0x0000000009150000-0x0000000009183000-memory.dmp
        Filesize

        204KB

      • memory/1476-157-0x00000000070E0000-0x0000000007708000-memory.dmp
        Filesize

        6.2MB

      • memory/1476-158-0x0000000006ED0000-0x0000000006EF2000-memory.dmp
        Filesize

        136KB

      • memory/1476-193-0x0000000000FD0000-0x0000000000FD1000-memory.dmp
        Filesize

        4KB

      • memory/1476-143-0x0000000000000000-mapping.dmp
      • memory/1476-154-0x0000000006900000-0x0000000006936000-memory.dmp
        Filesize

        216KB

      • memory/1476-165-0x0000000007780000-0x00000000077E6000-memory.dmp
        Filesize

        408KB

      • memory/1476-178-0x0000000007DB0000-0x0000000007DFB000-memory.dmp
        Filesize

        300KB

      • memory/1476-163-0x0000000007070000-0x00000000070D6000-memory.dmp
        Filesize

        408KB

      • memory/1476-214-0x00000000070E0000-0x0000000007708000-memory.dmp
        Filesize

        6.2MB

      • memory/1476-153-0x0000000000FD0000-0x0000000000FD1000-memory.dmp
        Filesize

        4KB

      • memory/1476-152-0x0000000000FD0000-0x0000000000FD1000-memory.dmp
        Filesize

        4KB

      • memory/1476-177-0x0000000007C70000-0x0000000007C8C000-memory.dmp
        Filesize

        112KB

      • memory/1476-217-0x0000000009150000-0x0000000009183000-memory.dmp
        Filesize

        204KB

      • memory/1476-184-0x00000000080A0000-0x0000000008116000-memory.dmp
        Filesize

        472KB

      • memory/1476-174-0x0000000006AA0000-0x0000000006AA1000-memory.dmp
        Filesize

        4KB

      • memory/1476-169-0x0000000007820000-0x0000000007B70000-memory.dmp
        Filesize

        3.3MB

      • memory/3584-123-0x0000000008760000-0x00000000087AB000-memory.dmp
        Filesize

        300KB

      • memory/3584-122-0x0000000008800000-0x000000000889C000-memory.dmp
        Filesize

        624KB

      • memory/3584-121-0x00000000084C0000-0x00000000084CC000-memory.dmp
        Filesize

        48KB

      • memory/3584-120-0x0000000004E40000-0x0000000004ED2000-memory.dmp
        Filesize

        584KB

      • memory/3584-124-0x0000000008A10000-0x0000000008A86000-memory.dmp
        Filesize

        472KB

      • memory/3584-119-0x0000000004F80000-0x0000000004F8A000-memory.dmp
        Filesize

        40KB

      • memory/3584-115-0x00000000005D0000-0x000000000069A000-memory.dmp
        Filesize

        808KB

      • memory/3584-118-0x0000000004EE0000-0x0000000004F72000-memory.dmp
        Filesize

        584KB

      • memory/3584-117-0x0000000005500000-0x00000000059FE000-memory.dmp
        Filesize

        5.0MB

      • memory/3584-116-0x00000000005D0000-0x000000000069A000-memory.dmp
        Filesize

        808KB

      • memory/4404-139-0x0000000007B60000-0x000000000805E000-memory.dmp
        Filesize

        5.0MB

      • memory/4404-131-0x0000000000380000-0x00000000005D8000-memory.dmp
        Filesize

        2.3MB

      • memory/4404-136-0x0000000004D50000-0x0000000004D58000-memory.dmp
        Filesize

        32KB

      • memory/4404-135-0x0000000004D40000-0x0000000004D48000-memory.dmp
        Filesize

        32KB

      • memory/4404-140-0x0000000004F80000-0x0000000004F81000-memory.dmp
        Filesize

        4KB

      • memory/4404-134-0x0000000004D20000-0x0000000004D28000-memory.dmp
        Filesize

        32KB

      • memory/4404-138-0x00000000062D0000-0x000000000639A000-memory.dmp
        Filesize

        808KB

      • memory/4404-137-0x00000000060C0000-0x00000000062CE000-memory.dmp
        Filesize

        2.1MB

      • memory/4404-133-0x0000000004D10000-0x0000000004D18000-memory.dmp
        Filesize

        32KB

      • memory/4404-132-0x0000000004DB0000-0x0000000004E4C000-memory.dmp
        Filesize

        624KB

      • memory/4404-147-0x0000000007910000-0x00000000079A2000-memory.dmp
        Filesize

        584KB

      • memory/4404-150-0x00000000078D0000-0x00000000078DA000-memory.dmp
        Filesize

        40KB

      • memory/4404-128-0x0000000000000000-mapping.dmp
      • memory/4512-125-0x0000000000400000-0x000000000043F000-memory.dmp
        Filesize

        252KB

      • memory/4512-127-0x0000000000400000-0x000000000043F000-memory.dmp
        Filesize

        252KB

      • memory/4512-126-0x000000000040AE9E-mapping.dmp
      • memory/4996-202-0x0000000000400000-0x00000000007E5000-memory.dmp
        Filesize

        3.9MB

      • memory/4996-185-0x00000000007E2730-mapping.dmp
      • memory/4996-186-0x0000000000940000-0x0000000000941000-memory.dmp
        Filesize

        4KB

      • memory/4996-189-0x0000000000400000-0x00000000007E5000-memory.dmp
        Filesize

        3.9MB

      • memory/4996-182-0x0000000000400000-0x00000000007E5000-memory.dmp
        Filesize

        3.9MB

      • memory/4996-187-0x0000000000940000-0x0000000000941000-memory.dmp
        Filesize

        4KB