Analysis
-
max time kernel
152s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-06-2022 07:36
Static task
static1
Behavioral task
behavioral1
Sample
b68542cfc28fcfae0313042956a7bf72.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
b68542cfc28fcfae0313042956a7bf72.exe
Resource
win10v2004-20220414-en
General
-
Target
b68542cfc28fcfae0313042956a7bf72.exe
-
Size
3.1MB
-
MD5
b68542cfc28fcfae0313042956a7bf72
-
SHA1
245eddeb197886aaa3d2eefb12ad4b074462b299
-
SHA256
b152d8eb3429cc766add38acd8cfe35f6a67f071e9c534b679d1b8ab5f9771d3
-
SHA512
855d457c2c0df22890bb2c0616a4edc5cd832d181be39b3e9e1495a3ec94640c367312a1fbb7450cd01f56bb1b149e1209fb5d8685f98070aee0cccc7fa47bf7
Malware Config
Extracted
bitrat
1.38
62.197.136.15:5103
-
communication_password
e10adc3949ba59abbe56e057f20f883e
-
tor_process
tor
Signatures
-
suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
b68542cfc28fcfae0313042956a7bf72.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation b68542cfc28fcfae0313042956a7bf72.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
b68542cfc28fcfae0313042956a7bf72.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\updater = "\"C:\\Users\\Admin\\AppData\\Roaming\\Google\\updater.exe\"" b68542cfc28fcfae0313042956a7bf72.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
MSBuild.exepid process 3552 MSBuild.exe 3552 MSBuild.exe 3552 MSBuild.exe 3552 MSBuild.exe 3552 MSBuild.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b68542cfc28fcfae0313042956a7bf72.exedescription pid process target process PID 2272 set thread context of 3552 2272 b68542cfc28fcfae0313042956a7bf72.exe MSBuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3028 timeout.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
b68542cfc28fcfae0313042956a7bf72.exepid process 2272 b68542cfc28fcfae0313042956a7bf72.exe 2272 b68542cfc28fcfae0313042956a7bf72.exe 2272 b68542cfc28fcfae0313042956a7bf72.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
b68542cfc28fcfae0313042956a7bf72.exeMSBuild.exedescription pid process Token: SeDebugPrivilege 2272 b68542cfc28fcfae0313042956a7bf72.exe Token: SeShutdownPrivilege 3552 MSBuild.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
MSBuild.exepid process 3552 MSBuild.exe 3552 MSBuild.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
b68542cfc28fcfae0313042956a7bf72.execmd.exedescription pid process target process PID 2272 wrote to memory of 1740 2272 b68542cfc28fcfae0313042956a7bf72.exe cmd.exe PID 2272 wrote to memory of 1740 2272 b68542cfc28fcfae0313042956a7bf72.exe cmd.exe PID 2272 wrote to memory of 1740 2272 b68542cfc28fcfae0313042956a7bf72.exe cmd.exe PID 1740 wrote to memory of 3028 1740 cmd.exe timeout.exe PID 1740 wrote to memory of 3028 1740 cmd.exe timeout.exe PID 1740 wrote to memory of 3028 1740 cmd.exe timeout.exe PID 2272 wrote to memory of 3552 2272 b68542cfc28fcfae0313042956a7bf72.exe MSBuild.exe PID 2272 wrote to memory of 3552 2272 b68542cfc28fcfae0313042956a7bf72.exe MSBuild.exe PID 2272 wrote to memory of 3552 2272 b68542cfc28fcfae0313042956a7bf72.exe MSBuild.exe PID 2272 wrote to memory of 3552 2272 b68542cfc28fcfae0313042956a7bf72.exe MSBuild.exe PID 2272 wrote to memory of 3552 2272 b68542cfc28fcfae0313042956a7bf72.exe MSBuild.exe PID 2272 wrote to memory of 3552 2272 b68542cfc28fcfae0313042956a7bf72.exe MSBuild.exe PID 2272 wrote to memory of 3552 2272 b68542cfc28fcfae0313042956a7bf72.exe MSBuild.exe PID 2272 wrote to memory of 3552 2272 b68542cfc28fcfae0313042956a7bf72.exe MSBuild.exe PID 2272 wrote to memory of 3552 2272 b68542cfc28fcfae0313042956a7bf72.exe MSBuild.exe PID 2272 wrote to memory of 3552 2272 b68542cfc28fcfae0313042956a7bf72.exe MSBuild.exe PID 2272 wrote to memory of 3552 2272 b68542cfc28fcfae0313042956a7bf72.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b68542cfc28fcfae0313042956a7bf72.exe"C:\Users\Admin\AppData\Local\Temp\b68542cfc28fcfae0313042956a7bf72.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 422⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\timeout.exetimeout 423⤵
- Delays execution with timeout.exe
PID:3028
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3552
-