Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-06-2022 07:36
Static task
static1
Behavioral task
behavioral1
Sample
b68542cfc28fcfae0313042956a7bf72.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
b68542cfc28fcfae0313042956a7bf72.exe
Resource
win10v2004-20220414-en
General
-
Target
b68542cfc28fcfae0313042956a7bf72.exe
-
Size
3.1MB
-
MD5
b68542cfc28fcfae0313042956a7bf72
-
SHA1
245eddeb197886aaa3d2eefb12ad4b074462b299
-
SHA256
b152d8eb3429cc766add38acd8cfe35f6a67f071e9c534b679d1b8ab5f9771d3
-
SHA512
855d457c2c0df22890bb2c0616a4edc5cd832d181be39b3e9e1495a3ec94640c367312a1fbb7450cd01f56bb1b149e1209fb5d8685f98070aee0cccc7fa47bf7
Malware Config
Extracted
bitrat
1.38
62.197.136.15:5103
-
communication_password
e10adc3949ba59abbe56e057f20f883e
-
tor_process
tor
Signatures
-
suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Windows\Microsoft.NET\Framework\v4.0.30319\Unknown.dll acprotect C:\Windows\Microsoft.NET\Framework\v4.0.30319\Unknown.dll acprotect -
Processes:
resource yara_rule behavioral1/memory/880-84-0x0000000000400000-0x00000000008DC000-memory.dmp upx behavioral1/memory/880-86-0x0000000000400000-0x00000000008DC000-memory.dmp upx behavioral1/memory/880-87-0x0000000000400000-0x00000000008DC000-memory.dmp upx behavioral1/memory/880-90-0x0000000000400000-0x00000000008DC000-memory.dmp upx behavioral1/memory/880-91-0x0000000000400000-0x00000000008DC000-memory.dmp upx behavioral1/memory/880-100-0x0000000000400000-0x00000000008DC000-memory.dmp upx -
Loads dropped DLL 1 IoCs
Processes:
MSBuild.exepid process 964 MSBuild.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
b68542cfc28fcfae0313042956a7bf72.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\updater = "\"C:\\Users\\Admin\\AppData\\Roaming\\Google\\updater.exe\"" b68542cfc28fcfae0313042956a7bf72.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
MSBuild.exepid process 676 MSBuild.exe 676 MSBuild.exe 676 MSBuild.exe 676 MSBuild.exe 676 MSBuild.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
b68542cfc28fcfae0313042956a7bf72.exeMSBuild.exeMSBuild.exedescription pid process target process PID 1756 set thread context of 676 1756 b68542cfc28fcfae0313042956a7bf72.exe MSBuild.exe PID 676 set thread context of 880 676 MSBuild.exe MSBuild.exe PID 880 set thread context of 964 880 MSBuild.exe MSBuild.exe -
Drops file in Windows directory 25 IoCs
Processes:
MSBuild.exedescription ioc process File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\External\ComponentsExt\api-ms-win-crt-environment-l1-1-0.dll MSBuild.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\External\ComponentsExt\api-ms-win-crt-heap-l1-1-0.dll MSBuild.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\External\ComponentsExt\api-ms-win-crt-time-l1-1-0.dll MSBuild.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\External\ComponentsExt\freebl3.dll MSBuild.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\External\ComponentsExt\mozglue.dll MSBuild.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\External MSBuild.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\License.XenArmor MSBuild.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\External\ComponentsExt\api-ms-win-crt-math-l1-1-0.dll MSBuild.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\External\ComponentsExt\api-ms-win-crt-multibyte-l1-1-0.dll MSBuild.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\External\ComponentsExt\api-ms-win-crt-runtime-l1-1-0.dll MSBuild.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\External\ComponentsExt\msvcp140.dll MSBuild.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\External\ComponentsExt\vcruntime140.dll MSBuild.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\Unknown.dll MSBuild.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\External\ComponentsExt MSBuild.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\License.XenArmor MSBuild.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\External\ComponentsExt\nss3.dll MSBuild.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\External\ComponentsExt\softokn3.dll MSBuild.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\Unknown.dll MSBuild.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\External\ComponentsExt\api-ms-win-crt-conio-l1-1-0_not.dll MSBuild.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\External\ComponentsExt\api-ms-win-crt-utility-l1-1-0.dll MSBuild.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\External\ComponentsExt\api-ms-win-crt-locale-l1-1-0.dll MSBuild.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\External\ComponentsExt\api-ms-win-crt-stdio-l1-1-0.dll MSBuild.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\External\ComponentsExt\api-ms-win-crt-string-l1-1-0.dll MSBuild.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\External\ComponentsExt\api-ms-win-crt-convert-l1-1-0.dll MSBuild.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\External\ComponentsExt\api-ms-win-crt-filesystem-l1-1-0.dll MSBuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2028 timeout.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
b68542cfc28fcfae0313042956a7bf72.exepid process 1756 b68542cfc28fcfae0313042956a7bf72.exe 1756 b68542cfc28fcfae0313042956a7bf72.exe 1756 b68542cfc28fcfae0313042956a7bf72.exe 1756 b68542cfc28fcfae0313042956a7bf72.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
b68542cfc28fcfae0313042956a7bf72.exeMSBuild.exedescription pid process Token: SeDebugPrivilege 1756 b68542cfc28fcfae0313042956a7bf72.exe Token: SeDebugPrivilege 676 MSBuild.exe Token: SeShutdownPrivilege 676 MSBuild.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
MSBuild.exepid process 676 MSBuild.exe 676 MSBuild.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
b68542cfc28fcfae0313042956a7bf72.execmd.exeMSBuild.exeMSBuild.exedescription pid process target process PID 1756 wrote to memory of 2032 1756 b68542cfc28fcfae0313042956a7bf72.exe cmd.exe PID 1756 wrote to memory of 2032 1756 b68542cfc28fcfae0313042956a7bf72.exe cmd.exe PID 1756 wrote to memory of 2032 1756 b68542cfc28fcfae0313042956a7bf72.exe cmd.exe PID 1756 wrote to memory of 2032 1756 b68542cfc28fcfae0313042956a7bf72.exe cmd.exe PID 2032 wrote to memory of 2028 2032 cmd.exe timeout.exe PID 2032 wrote to memory of 2028 2032 cmd.exe timeout.exe PID 2032 wrote to memory of 2028 2032 cmd.exe timeout.exe PID 2032 wrote to memory of 2028 2032 cmd.exe timeout.exe PID 1756 wrote to memory of 1920 1756 b68542cfc28fcfae0313042956a7bf72.exe MSBuild.exe PID 1756 wrote to memory of 1920 1756 b68542cfc28fcfae0313042956a7bf72.exe MSBuild.exe PID 1756 wrote to memory of 1920 1756 b68542cfc28fcfae0313042956a7bf72.exe MSBuild.exe PID 1756 wrote to memory of 1920 1756 b68542cfc28fcfae0313042956a7bf72.exe MSBuild.exe PID 1756 wrote to memory of 676 1756 b68542cfc28fcfae0313042956a7bf72.exe MSBuild.exe PID 1756 wrote to memory of 676 1756 b68542cfc28fcfae0313042956a7bf72.exe MSBuild.exe PID 1756 wrote to memory of 676 1756 b68542cfc28fcfae0313042956a7bf72.exe MSBuild.exe PID 1756 wrote to memory of 676 1756 b68542cfc28fcfae0313042956a7bf72.exe MSBuild.exe PID 1756 wrote to memory of 676 1756 b68542cfc28fcfae0313042956a7bf72.exe MSBuild.exe PID 1756 wrote to memory of 676 1756 b68542cfc28fcfae0313042956a7bf72.exe MSBuild.exe PID 1756 wrote to memory of 676 1756 b68542cfc28fcfae0313042956a7bf72.exe MSBuild.exe PID 1756 wrote to memory of 676 1756 b68542cfc28fcfae0313042956a7bf72.exe MSBuild.exe PID 1756 wrote to memory of 676 1756 b68542cfc28fcfae0313042956a7bf72.exe MSBuild.exe PID 1756 wrote to memory of 676 1756 b68542cfc28fcfae0313042956a7bf72.exe MSBuild.exe PID 1756 wrote to memory of 676 1756 b68542cfc28fcfae0313042956a7bf72.exe MSBuild.exe PID 1756 wrote to memory of 676 1756 b68542cfc28fcfae0313042956a7bf72.exe MSBuild.exe PID 676 wrote to memory of 880 676 MSBuild.exe MSBuild.exe PID 676 wrote to memory of 880 676 MSBuild.exe MSBuild.exe PID 676 wrote to memory of 880 676 MSBuild.exe MSBuild.exe PID 676 wrote to memory of 880 676 MSBuild.exe MSBuild.exe PID 676 wrote to memory of 880 676 MSBuild.exe MSBuild.exe PID 676 wrote to memory of 880 676 MSBuild.exe MSBuild.exe PID 676 wrote to memory of 880 676 MSBuild.exe MSBuild.exe PID 676 wrote to memory of 880 676 MSBuild.exe MSBuild.exe PID 880 wrote to memory of 964 880 MSBuild.exe MSBuild.exe PID 880 wrote to memory of 964 880 MSBuild.exe MSBuild.exe PID 880 wrote to memory of 964 880 MSBuild.exe MSBuild.exe PID 880 wrote to memory of 964 880 MSBuild.exe MSBuild.exe PID 880 wrote to memory of 964 880 MSBuild.exe MSBuild.exe PID 880 wrote to memory of 964 880 MSBuild.exe MSBuild.exe PID 880 wrote to memory of 964 880 MSBuild.exe MSBuild.exe PID 880 wrote to memory of 964 880 MSBuild.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b68542cfc28fcfae0313042956a7bf72.exe"C:\Users\Admin\AppData\Local\Temp\b68542cfc28fcfae0313042956a7bf72.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 422⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\timeout.exetimeout 423⤵
- Delays execution with timeout.exe
PID:2028
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe2⤵PID:1920
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe-a "C:\Users\Admin\AppData\Local\9e1a53f0\plg\67xLSq4r.json"3⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe-a "C:\Users\Admin\AppData\Local\Temp\unk.xml"4⤵
- Loads dropped DLL
PID:964
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
104B
MD54f3bde9212e17ef18226866d6ac739b6
SHA1732733bec8314beb81437e60876ffa75e72ae6cd
SHA256212173a405c78d70f90e8ec0699a60ed2f4a9f3a8070de62eabd666c268fb174
SHA51210b7cdae0b9a7b0f8e1bfc66a60675fa9b25c523864d5ae3da243f4e6e4c5194f3bd92af57ac956157442f66414bdd3393d0a1e5ba4ef0f192561e8524d4e744
-
Filesize
793KB
MD586114faba7e1ec4a667d2bcb2e23f024
SHA1670df6e1ba1dc6bece046e8b2e573dd36748245e
SHA256568da887725ccfdc4c5aae3ff66792fe60eca4e0818338f6a8434be66a6fe46d
SHA512d26ee0da6ccd4022982cf848c46e40f6781b667e39d0c5daf5ea8d74c44e55c55a5f7590a4d2a60aa1911358ca783c4276a9b4e6311c4cea20df1ebd4f7f457f
-
Filesize
793KB
MD586114faba7e1ec4a667d2bcb2e23f024
SHA1670df6e1ba1dc6bece046e8b2e573dd36748245e
SHA256568da887725ccfdc4c5aae3ff66792fe60eca4e0818338f6a8434be66a6fe46d
SHA512d26ee0da6ccd4022982cf848c46e40f6781b667e39d0c5daf5ea8d74c44e55c55a5f7590a4d2a60aa1911358ca783c4276a9b4e6311c4cea20df1ebd4f7f457f