Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
07-01-2022 13:06
Static task
static1
General
-
Target
bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe
-
Size
2.2MB
-
MD5
9401cf9f73dfb187bf4cef05d8cfe72b
-
SHA1
4af6544d8c94bb673f826a0ba4d24698150b1089
-
SHA256
bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45
-
SHA512
8438c79aa1ac9779bdab11a3f46f174aad97a7bc2fd1f571d42ef8817dc8477b68468be7445c789d125c1b8749338e047e20301d0a11b9e52dacf947abb65dd4
Malware Config
Extracted
bitrat
1.38
severdops.ddns.net:3071
-
communication_password
29ef52e7563626a96cea7f4b4085c124
-
tor_process
tor
Signatures
-
suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
-
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Looks for VMWare Tools registry key 2 TTPs
-
Processes:
resource yara_rule behavioral1/memory/1260-166-0x0000000000400000-0x00000000007E5000-memory.dmp upx behavioral1/memory/1260-171-0x0000000000400000-0x00000000007E5000-memory.dmp upx behavioral1/memory/1260-181-0x0000000000400000-0x00000000007E5000-memory.dmp upx -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe -
Processes:
bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Public\Documents\TATTOOISTSEAB\svchost.exe = "0" bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe = "0" bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\WAISTERSFDC = "C:\\Users\\Public\\Documents\\TATTOOISTSEAB\\svchost.exe" bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
cvtres.exepid process 1260 cvtres.exe 1260 cvtres.exe 1260 cvtres.exe 1260 cvtres.exe 1260 cvtres.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exedescription pid process target process PID 3064 set thread context of 1260 3064 bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe cvtres.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exepowershell.exepowershell.exepowershell.exepid process 3064 bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe 3064 bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe 3064 bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe 3064 bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe 2992 powershell.exe 652 powershell.exe 2248 powershell.exe 652 powershell.exe 2248 powershell.exe 2992 powershell.exe 3064 bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe 3064 bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe 3064 bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe 3064 bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe 3064 bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe 3064 bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe 2248 powershell.exe 2992 powershell.exe 652 powershell.exe 3064 bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe 3064 bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exepowershell.exepowershell.exepowershell.execvtres.exedescription pid process Token: SeDebugPrivilege 3064 bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe Token: SeDebugPrivilege 652 powershell.exe Token: SeDebugPrivilege 2992 powershell.exe Token: SeDebugPrivilege 2248 powershell.exe Token: SeShutdownPrivilege 1260 cvtres.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
cvtres.exepid process 1260 cvtres.exe 1260 cvtres.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exedescription pid process target process PID 3064 wrote to memory of 2992 3064 bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe powershell.exe PID 3064 wrote to memory of 2992 3064 bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe powershell.exe PID 3064 wrote to memory of 2992 3064 bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe powershell.exe PID 3064 wrote to memory of 652 3064 bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe powershell.exe PID 3064 wrote to memory of 652 3064 bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe powershell.exe PID 3064 wrote to memory of 652 3064 bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe powershell.exe PID 3064 wrote to memory of 2248 3064 bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe powershell.exe PID 3064 wrote to memory of 2248 3064 bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe powershell.exe PID 3064 wrote to memory of 2248 3064 bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe powershell.exe PID 3064 wrote to memory of 2356 3064 bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe aspnet_wp.exe PID 3064 wrote to memory of 2356 3064 bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe aspnet_wp.exe PID 3064 wrote to memory of 2356 3064 bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe aspnet_wp.exe PID 3064 wrote to memory of 1260 3064 bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe cvtres.exe PID 3064 wrote to memory of 1260 3064 bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe cvtres.exe PID 3064 wrote to memory of 1260 3064 bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe cvtres.exe PID 3064 wrote to memory of 1260 3064 bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe cvtres.exe PID 3064 wrote to memory of 1260 3064 bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe cvtres.exe PID 3064 wrote to memory of 1260 3064 bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe cvtres.exe PID 3064 wrote to memory of 1260 3064 bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe cvtres.exe PID 3064 wrote to memory of 1260 3064 bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe cvtres.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe"C:\Users\Admin\AppData\Local\Temp\bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe"1⤵
- Checks BIOS information in registry
- Windows security modification
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Public\Documents\TATTOOISTSEAB\svchost.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Public\Documents\TATTOOISTSEAB\svchost.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
5cf84233bf8fe2abf3df1cb89b86a706
SHA1639bf7dc31a2b69cf3256556e2a057a7974a3402
SHA256ff6da2be216f4d9f01eb01b4c9fb7bc17581c0c73d71d136d51bbb3c34dfb2b4
SHA5129feeb7dd022ba4f128ca4440c3a96b3fa03c27df18377500e9d5f3ebc7ad5b2c4cc5cc78d659713a2db3492e273bf09eaa0a49627d5379c16e8b7d1c96d9e20c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
5cf84233bf8fe2abf3df1cb89b86a706
SHA1639bf7dc31a2b69cf3256556e2a057a7974a3402
SHA256ff6da2be216f4d9f01eb01b4c9fb7bc17581c0c73d71d136d51bbb3c34dfb2b4
SHA5129feeb7dd022ba4f128ca4440c3a96b3fa03c27df18377500e9d5f3ebc7ad5b2c4cc5cc78d659713a2db3492e273bf09eaa0a49627d5379c16e8b7d1c96d9e20c
-
memory/652-162-0x00000000075C0000-0x00000000075DC000-memory.dmpFilesize
112KB
-
memory/652-149-0x0000000007810000-0x0000000007876000-memory.dmpFilesize
408KB
-
memory/652-146-0x0000000007550000-0x00000000075B6000-memory.dmpFilesize
408KB
-
memory/652-213-0x0000000007550000-0x00000000075B6000-memory.dmpFilesize
408KB
-
memory/652-210-0x0000000006D20000-0x0000000006D42000-memory.dmpFilesize
136KB
-
memory/652-207-0x0000000008F80000-0x0000000008FB3000-memory.dmpFilesize
204KB
-
memory/652-201-0x0000000006DB0000-0x00000000073D8000-memory.dmpFilesize
6.2MB
-
memory/652-153-0x0000000000F70000-0x0000000000F71000-memory.dmpFilesize
4KB
-
memory/652-175-0x0000000000910000-0x0000000000911000-memory.dmpFilesize
4KB
-
memory/652-174-0x0000000007EB0000-0x0000000007F26000-memory.dmpFilesize
472KB
-
memory/652-127-0x0000000000000000-mapping.dmp
-
memory/652-156-0x0000000000F72000-0x0000000000F73000-memory.dmpFilesize
4KB
-
memory/652-204-0x0000000008F80000-0x0000000008FB3000-memory.dmpFilesize
204KB
-
memory/652-144-0x0000000006D20000-0x0000000006D42000-memory.dmpFilesize
136KB
-
memory/652-160-0x0000000007880000-0x0000000007BD0000-memory.dmpFilesize
3.3MB
-
memory/652-131-0x0000000000910000-0x0000000000911000-memory.dmpFilesize
4KB
-
memory/652-134-0x0000000000910000-0x0000000000911000-memory.dmpFilesize
4KB
-
memory/652-141-0x0000000006DB0000-0x00000000073D8000-memory.dmpFilesize
6.2MB
-
memory/652-165-0x00000000080C0000-0x000000000810B000-memory.dmpFilesize
300KB
-
memory/652-216-0x0000000007810000-0x0000000007876000-memory.dmpFilesize
408KB
-
memory/652-137-0x0000000000F80000-0x0000000000FB6000-memory.dmpFilesize
216KB
-
memory/1260-170-0x0000000000B40000-0x0000000000B41000-memory.dmpFilesize
4KB
-
memory/1260-166-0x0000000000400000-0x00000000007E5000-memory.dmpFilesize
3.9MB
-
memory/1260-171-0x0000000000400000-0x00000000007E5000-memory.dmpFilesize
3.9MB
-
memory/1260-181-0x0000000000400000-0x00000000007E5000-memory.dmpFilesize
3.9MB
-
memory/1260-167-0x00000000007E2730-mapping.dmp
-
memory/1260-169-0x0000000000B40000-0x0000000000B41000-memory.dmpFilesize
4KB
-
memory/2248-172-0x00000000080D0000-0x0000000008146000-memory.dmpFilesize
472KB
-
memory/2248-133-0x0000000000A70000-0x0000000000A71000-memory.dmpFilesize
4KB
-
memory/2248-215-0x0000000007730000-0x0000000007796000-memory.dmpFilesize
408KB
-
memory/2248-148-0x0000000007730000-0x0000000007796000-memory.dmpFilesize
408KB
-
memory/2248-206-0x0000000008F70000-0x0000000008FA3000-memory.dmpFilesize
204KB
-
memory/2248-212-0x0000000007000000-0x0000000007022000-memory.dmpFilesize
136KB
-
memory/2248-152-0x00000000077A0000-0x0000000007806000-memory.dmpFilesize
408KB
-
memory/2248-139-0x0000000007090000-0x00000000076B8000-memory.dmpFilesize
6.2MB
-
memory/2248-209-0x0000000008F70000-0x0000000008FA3000-memory.dmpFilesize
204KB
-
memory/2248-203-0x0000000007090000-0x00000000076B8000-memory.dmpFilesize
6.2MB
-
memory/2248-154-0x0000000004610000-0x0000000004611000-memory.dmpFilesize
4KB
-
memory/2248-178-0x0000000000A70000-0x0000000000A71000-memory.dmpFilesize
4KB
-
memory/2248-128-0x0000000000000000-mapping.dmp
-
memory/2248-157-0x0000000004612000-0x0000000004613000-memory.dmpFilesize
4KB
-
memory/2248-158-0x0000000007980000-0x0000000007CD0000-memory.dmpFilesize
3.3MB
-
memory/2248-145-0x0000000007000000-0x0000000007022000-memory.dmpFilesize
136KB
-
memory/2248-138-0x00000000045B0000-0x00000000045E6000-memory.dmpFilesize
216KB
-
memory/2248-132-0x0000000000A70000-0x0000000000A71000-memory.dmpFilesize
4KB
-
memory/2248-161-0x0000000007860000-0x000000000787C000-memory.dmpFilesize
112KB
-
memory/2248-163-0x00000000082D0000-0x000000000831B000-memory.dmpFilesize
300KB
-
memory/2992-130-0x00000000034A0000-0x00000000034A1000-memory.dmpFilesize
4KB
-
memory/2992-150-0x0000000007A30000-0x0000000007A96000-memory.dmpFilesize
408KB
-
memory/2992-164-0x0000000008610000-0x000000000862C000-memory.dmpFilesize
112KB
-
memory/2992-168-0x0000000008C30000-0x0000000008C7B000-memory.dmpFilesize
300KB
-
memory/2992-214-0x0000000007A30000-0x0000000007A96000-memory.dmpFilesize
408KB
-
memory/2992-129-0x00000000034A0000-0x00000000034A1000-memory.dmpFilesize
4KB
-
memory/2992-159-0x00000000082C0000-0x0000000008610000-memory.dmpFilesize
3.3MB
-
memory/2992-140-0x0000000007AB0000-0x00000000080D8000-memory.dmpFilesize
6.2MB
-
memory/2992-126-0x0000000000000000-mapping.dmp
-
memory/2992-173-0x0000000008A10000-0x0000000008A86000-memory.dmpFilesize
472KB
-
memory/2992-147-0x0000000008250000-0x00000000082B6000-memory.dmpFilesize
408KB
-
memory/2992-202-0x0000000009B00000-0x0000000009B33000-memory.dmpFilesize
204KB
-
memory/2992-176-0x00000000034A0000-0x00000000034A1000-memory.dmpFilesize
4KB
-
memory/2992-155-0x0000000003512000-0x0000000003513000-memory.dmpFilesize
4KB
-
memory/2992-205-0x0000000009B00000-0x0000000009B33000-memory.dmpFilesize
204KB
-
memory/2992-143-0x0000000007860000-0x0000000007882000-memory.dmpFilesize
136KB
-
memory/2992-200-0x0000000007AB0000-0x00000000080D8000-memory.dmpFilesize
6.2MB
-
memory/2992-136-0x0000000004F80000-0x0000000004FB6000-memory.dmpFilesize
216KB
-
memory/2992-208-0x0000000007860000-0x0000000007882000-memory.dmpFilesize
136KB
-
memory/2992-211-0x0000000008250000-0x00000000082B6000-memory.dmpFilesize
408KB
-
memory/2992-151-0x0000000003510000-0x0000000003511000-memory.dmpFilesize
4KB
-
memory/3064-119-0x0000000002450000-0x0000000002458000-memory.dmpFilesize
32KB
-
memory/3064-120-0x0000000004AE0000-0x0000000004AE8000-memory.dmpFilesize
32KB
-
memory/3064-142-0x00000000078A0000-0x00000000078AA000-memory.dmpFilesize
40KB
-
memory/3064-123-0x0000000004C20000-0x0000000004CB4000-memory.dmpFilesize
592KB
-
memory/3064-122-0x0000000004D10000-0x0000000004D11000-memory.dmpFilesize
4KB
-
memory/3064-124-0x0000000007920000-0x0000000007E1E000-memory.dmpFilesize
5.0MB
-
memory/3064-121-0x0000000005F50000-0x000000000615C000-memory.dmpFilesize
2.0MB
-
memory/3064-125-0x0000000007590000-0x00000000075F6000-memory.dmpFilesize
408KB
-
memory/3064-118-0x0000000002430000-0x0000000002438000-memory.dmpFilesize
32KB
-
memory/3064-115-0x0000000000130000-0x000000000036C000-memory.dmpFilesize
2.2MB
-
memory/3064-135-0x0000000007FC0000-0x0000000008052000-memory.dmpFilesize
584KB
-
memory/3064-117-0x0000000002420000-0x0000000002428000-memory.dmpFilesize
32KB
-
memory/3064-116-0x0000000004B80000-0x0000000004C1C000-memory.dmpFilesize
624KB