Analysis
-
max time kernel
55s -
max time network
59s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
09-06-2022 17:04
Static task
static1
Behavioral task
behavioral1
Sample
DOMUMENTO DE TRANSACCION REALIZADA.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
DOMUMENTO DE TRANSACCION REALIZADA.exe
Resource
win10-20220414-en
Behavioral task
behavioral3
Sample
DOMUMENTO DE TRANSACCION REALIZADA.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral4
Sample
DOMUMENTO DE TRANSACCION REALIZADA.exe
Resource
win11-20220223-en
General
-
Target
DOMUMENTO DE TRANSACCION REALIZADA.exe
-
Size
126KB
-
MD5
8c52bf0ad28692c8e274874606c362dd
-
SHA1
ebcda75002db41d1a7f3597ca9467aab625439f7
-
SHA256
ac6da2e8ec05b1e8e562c15745997b48c0f51aeb823d4858445123060f40bb57
-
SHA512
62dc35a98757814ceaec1f5ff41d97641e5ceabb3e5511ad79be3db272d63fbd001bb62ea9f019a773dd5293dd4993a87d775825dda827b5dd9c1a05d274bf24
Malware Config
Extracted
bitrat
1.38
breswew.duckdns.org:1880
-
communication_password
202cb962ac59075b964b07152d234b70
-
tor_process
tor
Signatures
-
suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
-
Processes:
resource yara_rule behavioral3/memory/204-137-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral3/memory/204-138-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral3/memory/204-139-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral3/memory/204-140-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral3/memory/204-141-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
DOMUMENTO DE TRANSACCION REALIZADA.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation DOMUMENTO DE TRANSACCION REALIZADA.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
DOMUMENTO DE TRANSACCION REALIZADA.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bwmwbs = "\"C:\\Users\\Admin\\AppData\\Roaming\\Qdeuus\\Bwmwbs.exe\"" DOMUMENTO DE TRANSACCION REALIZADA.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
InstallUtil.exepid process 204 InstallUtil.exe 204 InstallUtil.exe 204 InstallUtil.exe 204 InstallUtil.exe 204 InstallUtil.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
DOMUMENTO DE TRANSACCION REALIZADA.exedescription pid process target process PID 4668 set thread context of 204 4668 DOMUMENTO DE TRANSACCION REALIZADA.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4836 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
DOMUMENTO DE TRANSACCION REALIZADA.exepid process 4668 DOMUMENTO DE TRANSACCION REALIZADA.exe 4668 DOMUMENTO DE TRANSACCION REALIZADA.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
DOMUMENTO DE TRANSACCION REALIZADA.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 4668 DOMUMENTO DE TRANSACCION REALIZADA.exe Token: SeShutdownPrivilege 204 InstallUtil.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
InstallUtil.exepid process 204 InstallUtil.exe 204 InstallUtil.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
DOMUMENTO DE TRANSACCION REALIZADA.execmd.exedescription pid process target process PID 4668 wrote to memory of 4352 4668 DOMUMENTO DE TRANSACCION REALIZADA.exe cmd.exe PID 4668 wrote to memory of 4352 4668 DOMUMENTO DE TRANSACCION REALIZADA.exe cmd.exe PID 4668 wrote to memory of 4352 4668 DOMUMENTO DE TRANSACCION REALIZADA.exe cmd.exe PID 4668 wrote to memory of 2532 4668 DOMUMENTO DE TRANSACCION REALIZADA.exe cmd.exe PID 4668 wrote to memory of 2532 4668 DOMUMENTO DE TRANSACCION REALIZADA.exe cmd.exe PID 4668 wrote to memory of 2532 4668 DOMUMENTO DE TRANSACCION REALIZADA.exe cmd.exe PID 2532 wrote to memory of 4836 2532 cmd.exe timeout.exe PID 2532 wrote to memory of 4836 2532 cmd.exe timeout.exe PID 2532 wrote to memory of 4836 2532 cmd.exe timeout.exe PID 4668 wrote to memory of 204 4668 DOMUMENTO DE TRANSACCION REALIZADA.exe InstallUtil.exe PID 4668 wrote to memory of 204 4668 DOMUMENTO DE TRANSACCION REALIZADA.exe InstallUtil.exe PID 4668 wrote to memory of 204 4668 DOMUMENTO DE TRANSACCION REALIZADA.exe InstallUtil.exe PID 4668 wrote to memory of 204 4668 DOMUMENTO DE TRANSACCION REALIZADA.exe InstallUtil.exe PID 4668 wrote to memory of 204 4668 DOMUMENTO DE TRANSACCION REALIZADA.exe InstallUtil.exe PID 4668 wrote to memory of 204 4668 DOMUMENTO DE TRANSACCION REALIZADA.exe InstallUtil.exe PID 4668 wrote to memory of 204 4668 DOMUMENTO DE TRANSACCION REALIZADA.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DOMUMENTO DE TRANSACCION REALIZADA.exe"C:\Users\Admin\AppData\Local\Temp\DOMUMENTO DE TRANSACCION REALIZADA.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:4352
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 202⤵
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\timeout.exetimeout 203⤵
- Delays execution with timeout.exe
PID:4836 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:204