Malware Analysis Report

2024-11-30 20:02

Sample ID 220520-qmnlfadfc4
Target 87e7f916f7fe19bb8b599167e47394c007c378dbdde91ab916adfefb9019239c
SHA256 87e7f916f7fe19bb8b599167e47394c007c378dbdde91ab916adfefb9019239c
Tags
betabot backdoor botnet evasion persistence trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

87e7f916f7fe19bb8b599167e47394c007c378dbdde91ab916adfefb9019239c

Threat Level: Known bad

The file 87e7f916f7fe19bb8b599167e47394c007c378dbdde91ab916adfefb9019239c was found to be: Known bad.

Malicious Activity Summary

betabot backdoor botnet evasion persistence trojan

BetaBot

Modifies firewall policy service

Sets file execution options in registry

Checks BIOS information in registry

Loads dropped DLL

Checks whether UAC is enabled

Adds Run key to start application

Suspicious use of NtSetInformationThreadHideFromDebugger

Enumerates physical storage devices

Program crash

NSIS installer

Modifies Internet Explorer Protected Mode Banner

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Enumerates system info in registry

Suspicious behavior: MapViewOfSection

Modifies Internet Explorer settings

Modifies Internet Explorer Protected Mode

Checks processor information in registry

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-05-20 13:22

Signatures

NSIS installer

installer
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-05-20 13:22

Reported

2022-05-20 13:43

Platform

win7-20220414-en

Max time kernel

149s

Max time network

162s

Command Line

"C:\Windows\system32\Dwm.exe"

Signatures

BetaBot

trojan backdoor botnet betabot

Modifies firewall policy service

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\EnableFirewall = "0" C:\Windows\SysWOW64\explorer.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile C:\Windows\SysWOW64\explorer.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" C:\Windows\SysWOW64\explorer.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile C:\Windows\SysWOW64\explorer.exe N/A

Sets file execution options in registry

persistence

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Windows\SysWOW64\explorer.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Google Updater 2.0 = "C:\\ProgramData\\Google Updater 2.0\\9y7eio13.exe" C:\Windows\SysWOW64\explorer.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run C:\Windows\SysWOW64\explorer.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\Google Updater 2.0 = "\"C:\\ProgramData\\Google Updater 2.0\\9y7eio13.exe\"" C:\Windows\SysWOW64\explorer.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce C:\Windows\SysWOW64\explorer.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Windows\SysWOW64\cmd.exe N/A

Enumerates physical storage devices

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\SysWOW64\explorer.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Windows\SysWOW64\explorer.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\SysWOW64\cmd.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Windows\SysWOW64\cmd.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Windows\SysWOW64\explorer.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Windows\SysWOW64\explorer.exe N/A

Modifies Internet Explorer Protected Mode

Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" C:\Windows\SysWOW64\explorer.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" C:\Windows\SysWOW64\explorer.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" C:\Windows\SysWOW64\explorer.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" C:\Windows\SysWOW64\explorer.exe N/A

Modifies Internet Explorer Protected Mode Banner

Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" C:\Windows\SysWOW64\explorer.exe N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main C:\Windows\SysWOW64\explorer.exe N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\explorer.exe N/A
N/A N/A C:\Windows\SysWOW64\explorer.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\cmd.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\cmd.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\cmd.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\cmd.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\cmd.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\cmd.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\cmd.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Windows\SysWOW64\cmd.exe N/A
Token: SeCreateTokenPrivilege N/A C:\Windows\SysWOW64\cmd.exe N/A
Token: SeMachineAccountPrivilege N/A C:\Windows\SysWOW64\cmd.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\cmd.exe N/A
Token: SeAssignPrimaryTokenPrivilege N/A C:\Windows\SysWOW64\cmd.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Windows\SysWOW64\cmd.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\cmd.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeCreateTokenPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeMachineAccountPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeAssignPrimaryTokenPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\explorer.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1784 wrote to memory of 272 N/A C:\Users\Admin\AppData\Local\Temp\Purchase Order (#16062020).exe C:\Windows\SysWOW64\rundll32.exe
PID 1784 wrote to memory of 272 N/A C:\Users\Admin\AppData\Local\Temp\Purchase Order (#16062020).exe C:\Windows\SysWOW64\rundll32.exe
PID 1784 wrote to memory of 272 N/A C:\Users\Admin\AppData\Local\Temp\Purchase Order (#16062020).exe C:\Windows\SysWOW64\rundll32.exe
PID 1784 wrote to memory of 272 N/A C:\Users\Admin\AppData\Local\Temp\Purchase Order (#16062020).exe C:\Windows\SysWOW64\rundll32.exe
PID 1784 wrote to memory of 272 N/A C:\Users\Admin\AppData\Local\Temp\Purchase Order (#16062020).exe C:\Windows\SysWOW64\rundll32.exe
PID 1784 wrote to memory of 272 N/A C:\Users\Admin\AppData\Local\Temp\Purchase Order (#16062020).exe C:\Windows\SysWOW64\rundll32.exe
PID 1784 wrote to memory of 272 N/A C:\Users\Admin\AppData\Local\Temp\Purchase Order (#16062020).exe C:\Windows\SysWOW64\rundll32.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 272 wrote to memory of 948 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 948 wrote to memory of 1368 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\explorer.exe
PID 948 wrote to memory of 1368 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\explorer.exe
PID 948 wrote to memory of 1368 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\explorer.exe
PID 948 wrote to memory of 1368 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\explorer.exe
PID 948 wrote to memory of 1368 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\explorer.exe
PID 948 wrote to memory of 1368 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\explorer.exe
PID 948 wrote to memory of 1368 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\explorer.exe
PID 1368 wrote to memory of 1332 N/A C:\Windows\SysWOW64\explorer.exe C:\Windows\system32\Dwm.exe
PID 1368 wrote to memory of 1332 N/A C:\Windows\SysWOW64\explorer.exe C:\Windows\system32\Dwm.exe
PID 1368 wrote to memory of 1332 N/A C:\Windows\SysWOW64\explorer.exe C:\Windows\system32\Dwm.exe
PID 1368 wrote to memory of 1332 N/A C:\Windows\SysWOW64\explorer.exe C:\Windows\system32\Dwm.exe
PID 1368 wrote to memory of 1332 N/A C:\Windows\SysWOW64\explorer.exe C:\Windows\system32\Dwm.exe

Processes

C:\Windows\system32\Dwm.exe

"C:\Windows\system32\Dwm.exe"

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\Purchase Order (#16062020).exe

"C:\Users\Admin\AppData\Local\Temp\Purchase Order (#16062020).exe"

C:\Windows\SysWOW64\rundll32.exe

C:\Windows\system32\rundll32.exe ProfilePricket,Pretor

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\SysWOW64\explorer.exe

C:\Windows\SysWOW64\explorer.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 google.com udp
NL 142.250.179.142:80 google.com tcp
US 8.8.8.8:53 egamcorps.ga udp

Files

memory/1784-54-0x00000000755A1000-0x00000000755A3000-memory.dmp

memory/272-55-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\ProfilePricket.DLL

MD5 0bf7b531f22a6bbbac9daf40684622dc
SHA1 20c4e2cf99c54134756fcec23a842b46395dc0e0
SHA256 649a79f09a854a305237b9ee571f457d029029fcaef195717f748fb9ab1e24dd
SHA512 01ae028362e586e265750eaf84a5290d518dc6d5d6609556d6349dd78359724ef97ae2e07d630f4922f979e9a3c91229274a6d42710c61ec7f82de91853b9081

\Users\Admin\AppData\Local\Temp\ProfilePricket.dll

MD5 0bf7b531f22a6bbbac9daf40684622dc
SHA1 20c4e2cf99c54134756fcec23a842b46395dc0e0
SHA256 649a79f09a854a305237b9ee571f457d029029fcaef195717f748fb9ab1e24dd
SHA512 01ae028362e586e265750eaf84a5290d518dc6d5d6609556d6349dd78359724ef97ae2e07d630f4922f979e9a3c91229274a6d42710c61ec7f82de91853b9081

C:\Users\Admin\AppData\Local\Temp\Trial

MD5 09480579084e493aa58bd591e549f9d8
SHA1 50e86141376b2334e9872e47b499bf2dbf689a66
SHA256 0670f2019e0aa3016c4a6759e57fe4c00daece19ac7d7844533450bacff52dd2
SHA512 e3e21dc3fb967ca566ee718e3b556d89abe11a5ac1282a98ac7d255759d5a6722a33693922b8fed5b22be80196162085cb33f3e4aa15a9bc23f1dc51e454cf2b

memory/272-60-0x0000000074220000-0x0000000074278000-memory.dmp

memory/272-62-0x0000000075000000-0x0000000075035000-memory.dmp

memory/272-63-0x0000000076E90000-0x0000000077039000-memory.dmp

memory/948-64-0x0000000000000000-mapping.dmp

memory/948-65-0x0000000076E90000-0x0000000077039000-memory.dmp

memory/948-66-0x0000000000090000-0x0000000000096000-memory.dmp

memory/948-72-0x0000000002430000-0x0000000002496000-memory.dmp

memory/948-74-0x0000000000400000-0x0000000000435000-memory.dmp

memory/948-75-0x0000000002430000-0x0000000002496000-memory.dmp

memory/948-76-0x00000000002E0000-0x00000000002ED000-memory.dmp

memory/948-77-0x0000000000530000-0x000000000053C000-memory.dmp

memory/1368-78-0x0000000000000000-mapping.dmp

memory/1368-80-0x0000000074121000-0x0000000074123000-memory.dmp

memory/1368-81-0x0000000077070000-0x00000000771F0000-memory.dmp

memory/1368-82-0x0000000000150000-0x0000000000203000-memory.dmp

memory/1368-83-0x0000000000940000-0x000000000094C000-memory.dmp

memory/1376-84-0x00000000026C0000-0x00000000026C6000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-05-20 13:22

Reported

2022-05-20 13:44

Platform

win10v2004-20220414-en

Max time kernel

112s

Max time network

186s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Purchase Order (#16062020).exe"

Signatures

BetaBot

trojan backdoor botnet betabot

Modifies firewall policy service

evasion
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile C:\Windows\SysWOW64\explorer.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" C:\Windows\SysWOW64\explorer.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile C:\Windows\SysWOW64\explorer.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\EnableFirewall = "0" C:\Windows\SysWOW64\explorer.exe N/A

Sets file execution options in registry

persistence

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Windows\SysWOW64\explorer.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce C:\Windows\SysWOW64\explorer.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Google Updater 2.0 = "C:\\ProgramData\\Google Updater 2.0\\m53e71g9o9.exe" C:\Windows\SysWOW64\explorer.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run C:\Windows\SysWOW64\explorer.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Updater 2.0 = "\"C:\\ProgramData\\Google Updater 2.0\\m53e71g9o9.exe\"" C:\Windows\SysWOW64\explorer.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Windows\SysWOW64\cmd.exe N/A

Enumerates physical storage devices

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\explorer.exe

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\SysWOW64\cmd.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\SysWOW64\explorer.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Windows\SysWOW64\explorer.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Windows\SysWOW64\explorer.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Windows\SysWOW64\explorer.exe N/A

Modifies Internet Explorer Protected Mode

Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" C:\Windows\SysWOW64\explorer.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" C:\Windows\SysWOW64\explorer.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" C:\Windows\SysWOW64\explorer.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" C:\Windows\SysWOW64\explorer.exe N/A

Modifies Internet Explorer Protected Mode Banner

Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" C:\Windows\SysWOW64\explorer.exe N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Internet Explorer\Main C:\Windows\SysWOW64\explorer.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\explorer.exe N/A
N/A N/A C:\Windows\SysWOW64\explorer.exe N/A
N/A N/A C:\Windows\SysWOW64\explorer.exe N/A
N/A N/A C:\Windows\SysWOW64\explorer.exe N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\cmd.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\cmd.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\cmd.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\cmd.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\cmd.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\cmd.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\cmd.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Windows\SysWOW64\cmd.exe N/A
Token: SeCreateTokenPrivilege N/A C:\Windows\SysWOW64\cmd.exe N/A
Token: SeMachineAccountPrivilege N/A C:\Windows\SysWOW64\cmd.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\cmd.exe N/A
Token: SeAssignPrimaryTokenPrivilege N/A C:\Windows\SysWOW64\cmd.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Windows\SysWOW64\cmd.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\cmd.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeCreateTokenPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeMachineAccountPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeAssignPrimaryTokenPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\explorer.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3512 wrote to memory of 5004 N/A C:\Users\Admin\AppData\Local\Temp\Purchase Order (#16062020).exe C:\Windows\SysWOW64\rundll32.exe
PID 3512 wrote to memory of 5004 N/A C:\Users\Admin\AppData\Local\Temp\Purchase Order (#16062020).exe C:\Windows\SysWOW64\rundll32.exe
PID 3512 wrote to memory of 5004 N/A C:\Users\Admin\AppData\Local\Temp\Purchase Order (#16062020).exe C:\Windows\SysWOW64\rundll32.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe
PID 5004 wrote to memory of 664 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\cmd.exe

Processes

C:\Users\Admin\AppData\Local\Temp\Purchase Order (#16062020).exe

"C:\Users\Admin\AppData\Local\Temp\Purchase Order (#16062020).exe"

C:\Windows\SysWOW64\rundll32.exe

C:\Windows\system32\rundll32.exe ProfilePricket,Pretor

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\SysWOW64\explorer.exe

C:\Windows\SysWOW64\explorer.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3372 -ip 3372

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3372 -s 1124

Network

Country Destination Domain Proto
US 20.42.65.88:443 tcp
NL 87.248.202.1:80 tcp
US 8.8.8.8:53 google.com udp
NL 142.250.179.142:80 google.com tcp

Files

memory/5004-130-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\ProfilePricket.dll

MD5 0bf7b531f22a6bbbac9daf40684622dc
SHA1 20c4e2cf99c54134756fcec23a842b46395dc0e0
SHA256 649a79f09a854a305237b9ee571f457d029029fcaef195717f748fb9ab1e24dd
SHA512 01ae028362e586e265750eaf84a5290d518dc6d5d6609556d6349dd78359724ef97ae2e07d630f4922f979e9a3c91229274a6d42710c61ec7f82de91853b9081

C:\Users\Admin\AppData\Local\Temp\ProfilePricket.DLL

MD5 0bf7b531f22a6bbbac9daf40684622dc
SHA1 20c4e2cf99c54134756fcec23a842b46395dc0e0
SHA256 649a79f09a854a305237b9ee571f457d029029fcaef195717f748fb9ab1e24dd
SHA512 01ae028362e586e265750eaf84a5290d518dc6d5d6609556d6349dd78359724ef97ae2e07d630f4922f979e9a3c91229274a6d42710c61ec7f82de91853b9081

C:\Users\Admin\AppData\Local\Temp\Trial

MD5 09480579084e493aa58bd591e549f9d8
SHA1 50e86141376b2334e9872e47b499bf2dbf689a66
SHA256 0670f2019e0aa3016c4a6759e57fe4c00daece19ac7d7844533450bacff52dd2
SHA512 e3e21dc3fb967ca566ee718e3b556d89abe11a5ac1282a98ac7d255759d5a6722a33693922b8fed5b22be80196162085cb33f3e4aa15a9bc23f1dc51e454cf2b

memory/5004-134-0x0000000074C60000-0x0000000074D28000-memory.dmp

memory/5004-136-0x0000000075DB0000-0x0000000075E13000-memory.dmp

memory/5004-137-0x00007FFDC92F0000-0x00007FFDC94E5000-memory.dmp

memory/664-138-0x0000000000000000-mapping.dmp

memory/664-139-0x00000000003F0000-0x00000000003F6000-memory.dmp

memory/664-140-0x00007FFDC92F0000-0x00007FFDC94E5000-memory.dmp

memory/664-145-0x0000000000400000-0x0000000000435000-memory.dmp

memory/664-146-0x0000000002E50000-0x0000000002EB6000-memory.dmp

memory/664-148-0x0000000002E50000-0x0000000002EB6000-memory.dmp

memory/664-149-0x0000000000CB0000-0x0000000000CBD000-memory.dmp

memory/664-150-0x0000000003020000-0x000000000302C000-memory.dmp

memory/3372-151-0x0000000000000000-mapping.dmp

memory/3372-152-0x00000000000C0000-0x00000000004F3000-memory.dmp

memory/3372-153-0x0000000000800000-0x00000000008A3000-memory.dmp