Analysis

  • max time kernel
    149s
  • max time network
    162s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-05-2022 13:22

General

  • Target

    Purchase Order (#16062020).exe

  • Size

    464KB

  • MD5

    9fbf3d861158629cfd1c65cf8425c8b6

  • SHA1

    b9ac6bdaed6db2a4c62754b897a625f9b6efa188

  • SHA256

    7ef7ff0660d406b237fd3253738d60a294c0273ca1436cf9ba87d5b2ea8d62d8

  • SHA512

    f8810d51c4673c3dee8209e5e4df0a3d482ef51b15d5d5a2d0bc8a4d264865306803a37b7a741f27595a361763b352bab370d1af26f2d1005ac3cd242ebd8496

Malware Config

Signatures

  • BetaBot

    Beta Bot is a Trojan that infects computers and disables Antivirus.

  • Modifies firewall policy service 2 TTPs 4 IoCs
  • Sets file execution options in registry 2 TTPs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 4 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\Dwm.exe
    "C:\Windows\system32\Dwm.exe"
    1⤵
      PID:1332
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1376
        • C:\Users\Admin\AppData\Local\Temp\Purchase Order (#16062020).exe
          "C:\Users\Admin\AppData\Local\Temp\Purchase Order (#16062020).exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1784
          • C:\Windows\SysWOW64\rundll32.exe
            C:\Windows\system32\rundll32.exe ProfilePricket,Pretor
            3⤵
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:272
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe"
              4⤵
              • Checks whether UAC is enabled
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Checks processor information in registry
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:948
              • C:\Windows\SysWOW64\explorer.exe
                C:\Windows\SysWOW64\explorer.exe
                5⤵
                • Modifies firewall policy service
                • Checks BIOS information in registry
                • Adds Run key to start application
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Checks processor information in registry
                • Enumerates system info in registry
                • Modifies Internet Explorer Protected Mode
                • Modifies Internet Explorer Protected Mode Banner
                • Modifies Internet Explorer settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1368

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      2
      T1060

      Defense Evasion

      Modify Registry

      6
      T1112

      Discovery

      Query Registry

      3
      T1012

      System Information Discovery

      5
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\ProfilePricket.DLL
        Filesize

        45KB

        MD5

        0bf7b531f22a6bbbac9daf40684622dc

        SHA1

        20c4e2cf99c54134756fcec23a842b46395dc0e0

        SHA256

        649a79f09a854a305237b9ee571f457d029029fcaef195717f748fb9ab1e24dd

        SHA512

        01ae028362e586e265750eaf84a5290d518dc6d5d6609556d6349dd78359724ef97ae2e07d630f4922f979e9a3c91229274a6d42710c61ec7f82de91853b9081

      • C:\Users\Admin\AppData\Local\Temp\Trial
        Filesize

        346KB

        MD5

        09480579084e493aa58bd591e549f9d8

        SHA1

        50e86141376b2334e9872e47b499bf2dbf689a66

        SHA256

        0670f2019e0aa3016c4a6759e57fe4c00daece19ac7d7844533450bacff52dd2

        SHA512

        e3e21dc3fb967ca566ee718e3b556d89abe11a5ac1282a98ac7d255759d5a6722a33693922b8fed5b22be80196162085cb33f3e4aa15a9bc23f1dc51e454cf2b

      • \Users\Admin\AppData\Local\Temp\ProfilePricket.dll
        Filesize

        45KB

        MD5

        0bf7b531f22a6bbbac9daf40684622dc

        SHA1

        20c4e2cf99c54134756fcec23a842b46395dc0e0

        SHA256

        649a79f09a854a305237b9ee571f457d029029fcaef195717f748fb9ab1e24dd

        SHA512

        01ae028362e586e265750eaf84a5290d518dc6d5d6609556d6349dd78359724ef97ae2e07d630f4922f979e9a3c91229274a6d42710c61ec7f82de91853b9081

      • memory/272-63-0x0000000076E90000-0x0000000077039000-memory.dmp
        Filesize

        1.7MB

      • memory/272-55-0x0000000000000000-mapping.dmp
      • memory/272-60-0x0000000074220000-0x0000000074278000-memory.dmp
        Filesize

        352KB

      • memory/272-62-0x0000000075000000-0x0000000075035000-memory.dmp
        Filesize

        212KB

      • memory/948-66-0x0000000000090000-0x0000000000096000-memory.dmp
        Filesize

        24KB

      • memory/948-76-0x00000000002E0000-0x00000000002ED000-memory.dmp
        Filesize

        52KB

      • memory/948-65-0x0000000076E90000-0x0000000077039000-memory.dmp
        Filesize

        1.7MB

      • memory/948-77-0x0000000000530000-0x000000000053C000-memory.dmp
        Filesize

        48KB

      • memory/948-72-0x0000000002430000-0x0000000002496000-memory.dmp
        Filesize

        408KB

      • memory/948-74-0x0000000000400000-0x0000000000435000-memory.dmp
        Filesize

        212KB

      • memory/948-75-0x0000000002430000-0x0000000002496000-memory.dmp
        Filesize

        408KB

      • memory/948-64-0x0000000000000000-mapping.dmp
      • memory/1368-78-0x0000000000000000-mapping.dmp
      • memory/1368-80-0x0000000074121000-0x0000000074123000-memory.dmp
        Filesize

        8KB

      • memory/1368-81-0x0000000077070000-0x00000000771F0000-memory.dmp
        Filesize

        1.5MB

      • memory/1368-82-0x0000000000150000-0x0000000000203000-memory.dmp
        Filesize

        716KB

      • memory/1368-83-0x0000000000940000-0x000000000094C000-memory.dmp
        Filesize

        48KB

      • memory/1376-84-0x00000000026C0000-0x00000000026C6000-memory.dmp
        Filesize

        24KB

      • memory/1784-54-0x00000000755A1000-0x00000000755A3000-memory.dmp
        Filesize

        8KB