Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    07-01-2022 13:06

General

  • Target

    bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe

  • Size

    2.2MB

  • MD5

    9401cf9f73dfb187bf4cef05d8cfe72b

  • SHA1

    4af6544d8c94bb673f826a0ba4d24698150b1089

  • SHA256

    bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45

  • SHA512

    8438c79aa1ac9779bdab11a3f46f174aad97a7bc2fd1f571d42ef8817dc8477b68468be7445c789d125c1b8749338e047e20301d0a11b9e52dacf947abb65dd4

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

severdops.ddns.net:3071

Attributes
  • communication_password

    29ef52e7563626a96cea7f4b4085c124

  • tor_process

    tor

Signatures

  • BitRAT

    BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

  • Windows security bypass 2 TTPs
  • suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)

    suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)

  • Looks for VirtualBox Guest Additions in registry 2 TTPs
  • Looks for VMWare Tools registry key 2 TTPs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Windows security modification 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe
    "C:\Users\Admin\AppData\Local\Temp\bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe"
    1⤵
    • Checks BIOS information in registry
    • Windows security modification
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3064
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Public\Documents\TATTOOISTSEAB\svchost.exe" -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2992
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Public\Documents\TATTOOISTSEAB\svchost.exe" -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:652
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\bb8298b28cd913814c41d7b6a878b8e2a2da7eb34083c901a5408413fed93b45.exe" -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2248
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"
      2⤵
        PID:2356
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
        2⤵
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1260

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Disabling Security Tools

    2
    T1089

    Modify Registry

    3
    T1112

    Virtualization/Sandbox Evasion

    2
    T1497

    Discovery

    Query Registry

    4
    T1012

    Virtualization/Sandbox Evasion

    2
    T1497

    System Information Discovery

    3
    T1082

    Peripheral Device Discovery

    1
    T1120

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      MD5

      5cf84233bf8fe2abf3df1cb89b86a706

      SHA1

      639bf7dc31a2b69cf3256556e2a057a7974a3402

      SHA256

      ff6da2be216f4d9f01eb01b4c9fb7bc17581c0c73d71d136d51bbb3c34dfb2b4

      SHA512

      9feeb7dd022ba4f128ca4440c3a96b3fa03c27df18377500e9d5f3ebc7ad5b2c4cc5cc78d659713a2db3492e273bf09eaa0a49627d5379c16e8b7d1c96d9e20c

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      MD5

      5cf84233bf8fe2abf3df1cb89b86a706

      SHA1

      639bf7dc31a2b69cf3256556e2a057a7974a3402

      SHA256

      ff6da2be216f4d9f01eb01b4c9fb7bc17581c0c73d71d136d51bbb3c34dfb2b4

      SHA512

      9feeb7dd022ba4f128ca4440c3a96b3fa03c27df18377500e9d5f3ebc7ad5b2c4cc5cc78d659713a2db3492e273bf09eaa0a49627d5379c16e8b7d1c96d9e20c

    • memory/652-162-0x00000000075C0000-0x00000000075DC000-memory.dmp
      Filesize

      112KB

    • memory/652-149-0x0000000007810000-0x0000000007876000-memory.dmp
      Filesize

      408KB

    • memory/652-146-0x0000000007550000-0x00000000075B6000-memory.dmp
      Filesize

      408KB

    • memory/652-213-0x0000000007550000-0x00000000075B6000-memory.dmp
      Filesize

      408KB

    • memory/652-210-0x0000000006D20000-0x0000000006D42000-memory.dmp
      Filesize

      136KB

    • memory/652-207-0x0000000008F80000-0x0000000008FB3000-memory.dmp
      Filesize

      204KB

    • memory/652-201-0x0000000006DB0000-0x00000000073D8000-memory.dmp
      Filesize

      6.2MB

    • memory/652-153-0x0000000000F70000-0x0000000000F71000-memory.dmp
      Filesize

      4KB

    • memory/652-175-0x0000000000910000-0x0000000000911000-memory.dmp
      Filesize

      4KB

    • memory/652-174-0x0000000007EB0000-0x0000000007F26000-memory.dmp
      Filesize

      472KB

    • memory/652-127-0x0000000000000000-mapping.dmp
    • memory/652-156-0x0000000000F72000-0x0000000000F73000-memory.dmp
      Filesize

      4KB

    • memory/652-204-0x0000000008F80000-0x0000000008FB3000-memory.dmp
      Filesize

      204KB

    • memory/652-144-0x0000000006D20000-0x0000000006D42000-memory.dmp
      Filesize

      136KB

    • memory/652-160-0x0000000007880000-0x0000000007BD0000-memory.dmp
      Filesize

      3.3MB

    • memory/652-131-0x0000000000910000-0x0000000000911000-memory.dmp
      Filesize

      4KB

    • memory/652-134-0x0000000000910000-0x0000000000911000-memory.dmp
      Filesize

      4KB

    • memory/652-141-0x0000000006DB0000-0x00000000073D8000-memory.dmp
      Filesize

      6.2MB

    • memory/652-165-0x00000000080C0000-0x000000000810B000-memory.dmp
      Filesize

      300KB

    • memory/652-216-0x0000000007810000-0x0000000007876000-memory.dmp
      Filesize

      408KB

    • memory/652-137-0x0000000000F80000-0x0000000000FB6000-memory.dmp
      Filesize

      216KB

    • memory/1260-170-0x0000000000B40000-0x0000000000B41000-memory.dmp
      Filesize

      4KB

    • memory/1260-166-0x0000000000400000-0x00000000007E5000-memory.dmp
      Filesize

      3.9MB

    • memory/1260-171-0x0000000000400000-0x00000000007E5000-memory.dmp
      Filesize

      3.9MB

    • memory/1260-181-0x0000000000400000-0x00000000007E5000-memory.dmp
      Filesize

      3.9MB

    • memory/1260-167-0x00000000007E2730-mapping.dmp
    • memory/1260-169-0x0000000000B40000-0x0000000000B41000-memory.dmp
      Filesize

      4KB

    • memory/2248-172-0x00000000080D0000-0x0000000008146000-memory.dmp
      Filesize

      472KB

    • memory/2248-133-0x0000000000A70000-0x0000000000A71000-memory.dmp
      Filesize

      4KB

    • memory/2248-215-0x0000000007730000-0x0000000007796000-memory.dmp
      Filesize

      408KB

    • memory/2248-148-0x0000000007730000-0x0000000007796000-memory.dmp
      Filesize

      408KB

    • memory/2248-206-0x0000000008F70000-0x0000000008FA3000-memory.dmp
      Filesize

      204KB

    • memory/2248-212-0x0000000007000000-0x0000000007022000-memory.dmp
      Filesize

      136KB

    • memory/2248-152-0x00000000077A0000-0x0000000007806000-memory.dmp
      Filesize

      408KB

    • memory/2248-139-0x0000000007090000-0x00000000076B8000-memory.dmp
      Filesize

      6.2MB

    • memory/2248-209-0x0000000008F70000-0x0000000008FA3000-memory.dmp
      Filesize

      204KB

    • memory/2248-203-0x0000000007090000-0x00000000076B8000-memory.dmp
      Filesize

      6.2MB

    • memory/2248-154-0x0000000004610000-0x0000000004611000-memory.dmp
      Filesize

      4KB

    • memory/2248-178-0x0000000000A70000-0x0000000000A71000-memory.dmp
      Filesize

      4KB

    • memory/2248-128-0x0000000000000000-mapping.dmp
    • memory/2248-157-0x0000000004612000-0x0000000004613000-memory.dmp
      Filesize

      4KB

    • memory/2248-158-0x0000000007980000-0x0000000007CD0000-memory.dmp
      Filesize

      3.3MB

    • memory/2248-145-0x0000000007000000-0x0000000007022000-memory.dmp
      Filesize

      136KB

    • memory/2248-138-0x00000000045B0000-0x00000000045E6000-memory.dmp
      Filesize

      216KB

    • memory/2248-132-0x0000000000A70000-0x0000000000A71000-memory.dmp
      Filesize

      4KB

    • memory/2248-161-0x0000000007860000-0x000000000787C000-memory.dmp
      Filesize

      112KB

    • memory/2248-163-0x00000000082D0000-0x000000000831B000-memory.dmp
      Filesize

      300KB

    • memory/2992-130-0x00000000034A0000-0x00000000034A1000-memory.dmp
      Filesize

      4KB

    • memory/2992-150-0x0000000007A30000-0x0000000007A96000-memory.dmp
      Filesize

      408KB

    • memory/2992-164-0x0000000008610000-0x000000000862C000-memory.dmp
      Filesize

      112KB

    • memory/2992-168-0x0000000008C30000-0x0000000008C7B000-memory.dmp
      Filesize

      300KB

    • memory/2992-214-0x0000000007A30000-0x0000000007A96000-memory.dmp
      Filesize

      408KB

    • memory/2992-129-0x00000000034A0000-0x00000000034A1000-memory.dmp
      Filesize

      4KB

    • memory/2992-159-0x00000000082C0000-0x0000000008610000-memory.dmp
      Filesize

      3.3MB

    • memory/2992-140-0x0000000007AB0000-0x00000000080D8000-memory.dmp
      Filesize

      6.2MB

    • memory/2992-126-0x0000000000000000-mapping.dmp
    • memory/2992-173-0x0000000008A10000-0x0000000008A86000-memory.dmp
      Filesize

      472KB

    • memory/2992-147-0x0000000008250000-0x00000000082B6000-memory.dmp
      Filesize

      408KB

    • memory/2992-202-0x0000000009B00000-0x0000000009B33000-memory.dmp
      Filesize

      204KB

    • memory/2992-176-0x00000000034A0000-0x00000000034A1000-memory.dmp
      Filesize

      4KB

    • memory/2992-155-0x0000000003512000-0x0000000003513000-memory.dmp
      Filesize

      4KB

    • memory/2992-205-0x0000000009B00000-0x0000000009B33000-memory.dmp
      Filesize

      204KB

    • memory/2992-143-0x0000000007860000-0x0000000007882000-memory.dmp
      Filesize

      136KB

    • memory/2992-200-0x0000000007AB0000-0x00000000080D8000-memory.dmp
      Filesize

      6.2MB

    • memory/2992-136-0x0000000004F80000-0x0000000004FB6000-memory.dmp
      Filesize

      216KB

    • memory/2992-208-0x0000000007860000-0x0000000007882000-memory.dmp
      Filesize

      136KB

    • memory/2992-211-0x0000000008250000-0x00000000082B6000-memory.dmp
      Filesize

      408KB

    • memory/2992-151-0x0000000003510000-0x0000000003511000-memory.dmp
      Filesize

      4KB

    • memory/3064-119-0x0000000002450000-0x0000000002458000-memory.dmp
      Filesize

      32KB

    • memory/3064-120-0x0000000004AE0000-0x0000000004AE8000-memory.dmp
      Filesize

      32KB

    • memory/3064-142-0x00000000078A0000-0x00000000078AA000-memory.dmp
      Filesize

      40KB

    • memory/3064-123-0x0000000004C20000-0x0000000004CB4000-memory.dmp
      Filesize

      592KB

    • memory/3064-122-0x0000000004D10000-0x0000000004D11000-memory.dmp
      Filesize

      4KB

    • memory/3064-124-0x0000000007920000-0x0000000007E1E000-memory.dmp
      Filesize

      5.0MB

    • memory/3064-121-0x0000000005F50000-0x000000000615C000-memory.dmp
      Filesize

      2.0MB

    • memory/3064-125-0x0000000007590000-0x00000000075F6000-memory.dmp
      Filesize

      408KB

    • memory/3064-118-0x0000000002430000-0x0000000002438000-memory.dmp
      Filesize

      32KB

    • memory/3064-115-0x0000000000130000-0x000000000036C000-memory.dmp
      Filesize

      2.2MB

    • memory/3064-135-0x0000000007FC0000-0x0000000008052000-memory.dmp
      Filesize

      584KB

    • memory/3064-117-0x0000000002420000-0x0000000002428000-memory.dmp
      Filesize

      32KB

    • memory/3064-116-0x0000000004B80000-0x0000000004C1C000-memory.dmp
      Filesize

      624KB