Analysis
-
max time kernel
191s -
max time network
199s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
15-06-2022 16:51
Static task
static1
Behavioral task
behavioral1
Sample
JO37GDDJF5_ETRANSFER_RECEIPT.exe
Resource
win7-20220414-en
General
-
Target
JO37GDDJF5_ETRANSFER_RECEIPT.exe
-
Size
300.0MB
-
MD5
9f791a0a9f76db609b44f0e3bf7bdef5
-
SHA1
0481f2e178c7a34b3d855e5c53553337fe2008ed
-
SHA256
ccd71d751bf017dee31f76eceded9aa6832f5e19b5389584d3665f76b4f0caf2
-
SHA512
06889bebdf092e4f1563e697e9c619a147954ffcb1f9dd9e9a9238d1410442373f95558c02e6bae6f5d832f89a46eab8b08114699f7321ce2e1150a69f1ad1ee
Malware Config
Extracted
bitrat
1.38
bitrat9300.duckdns.org:9300
-
communication_password
e10adc3949ba59abbe56e057f20f883e
-
tor_process
tor
Signatures
-
suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
-
Executes dropped EXE 1 IoCs
Processes:
nhbyg.exepid process 1932 nhbyg.exe -
Processes:
resource yara_rule behavioral1/memory/1760-61-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1760-63-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1760-64-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1760-67-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1760-66-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1760-70-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1760-71-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1760-72-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1760-80-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1596-98-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1596-99-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
Processes:
RegAsm.exeRegAsm.exepid process 1760 RegAsm.exe 1760 RegAsm.exe 1760 RegAsm.exe 1760 RegAsm.exe 1760 RegAsm.exe 1596 RegAsm.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
JO37GDDJF5_ETRANSFER_RECEIPT.exenhbyg.exedescription pid process target process PID 1764 set thread context of 1760 1764 JO37GDDJF5_ETRANSFER_RECEIPT.exe RegAsm.exe PID 1932 set thread context of 1596 1932 nhbyg.exe RegAsm.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2008 schtasks.exe 1360 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
RegAsm.exeRegAsm.exedescription pid process Token: SeDebugPrivilege 1760 RegAsm.exe Token: SeShutdownPrivilege 1760 RegAsm.exe Token: SeDebugPrivilege 1596 RegAsm.exe Token: SeShutdownPrivilege 1596 RegAsm.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
RegAsm.exepid process 1760 RegAsm.exe 1760 RegAsm.exe -
Suspicious use of WriteProcessMemory 50 IoCs
Processes:
JO37GDDJF5_ETRANSFER_RECEIPT.execmd.exetaskeng.exenhbyg.execmd.exedescription pid process target process PID 1764 wrote to memory of 2040 1764 JO37GDDJF5_ETRANSFER_RECEIPT.exe cmd.exe PID 1764 wrote to memory of 2040 1764 JO37GDDJF5_ETRANSFER_RECEIPT.exe cmd.exe PID 1764 wrote to memory of 2040 1764 JO37GDDJF5_ETRANSFER_RECEIPT.exe cmd.exe PID 1764 wrote to memory of 2040 1764 JO37GDDJF5_ETRANSFER_RECEIPT.exe cmd.exe PID 2040 wrote to memory of 2008 2040 cmd.exe schtasks.exe PID 2040 wrote to memory of 2008 2040 cmd.exe schtasks.exe PID 2040 wrote to memory of 2008 2040 cmd.exe schtasks.exe PID 2040 wrote to memory of 2008 2040 cmd.exe schtasks.exe PID 1764 wrote to memory of 1988 1764 JO37GDDJF5_ETRANSFER_RECEIPT.exe cmd.exe PID 1764 wrote to memory of 1988 1764 JO37GDDJF5_ETRANSFER_RECEIPT.exe cmd.exe PID 1764 wrote to memory of 1988 1764 JO37GDDJF5_ETRANSFER_RECEIPT.exe cmd.exe PID 1764 wrote to memory of 1988 1764 JO37GDDJF5_ETRANSFER_RECEIPT.exe cmd.exe PID 1764 wrote to memory of 1760 1764 JO37GDDJF5_ETRANSFER_RECEIPT.exe RegAsm.exe PID 1764 wrote to memory of 1760 1764 JO37GDDJF5_ETRANSFER_RECEIPT.exe RegAsm.exe PID 1764 wrote to memory of 1760 1764 JO37GDDJF5_ETRANSFER_RECEIPT.exe RegAsm.exe PID 1764 wrote to memory of 1760 1764 JO37GDDJF5_ETRANSFER_RECEIPT.exe RegAsm.exe PID 1764 wrote to memory of 1760 1764 JO37GDDJF5_ETRANSFER_RECEIPT.exe RegAsm.exe PID 1764 wrote to memory of 1760 1764 JO37GDDJF5_ETRANSFER_RECEIPT.exe RegAsm.exe PID 1764 wrote to memory of 1760 1764 JO37GDDJF5_ETRANSFER_RECEIPT.exe RegAsm.exe PID 1764 wrote to memory of 1760 1764 JO37GDDJF5_ETRANSFER_RECEIPT.exe RegAsm.exe PID 1764 wrote to memory of 1760 1764 JO37GDDJF5_ETRANSFER_RECEIPT.exe RegAsm.exe PID 1764 wrote to memory of 1760 1764 JO37GDDJF5_ETRANSFER_RECEIPT.exe RegAsm.exe PID 1764 wrote to memory of 1760 1764 JO37GDDJF5_ETRANSFER_RECEIPT.exe RegAsm.exe PID 1260 wrote to memory of 1932 1260 taskeng.exe nhbyg.exe PID 1260 wrote to memory of 1932 1260 taskeng.exe nhbyg.exe PID 1260 wrote to memory of 1932 1260 taskeng.exe nhbyg.exe PID 1260 wrote to memory of 1932 1260 taskeng.exe nhbyg.exe PID 1932 wrote to memory of 1376 1932 nhbyg.exe cmd.exe PID 1932 wrote to memory of 1376 1932 nhbyg.exe cmd.exe PID 1932 wrote to memory of 1376 1932 nhbyg.exe cmd.exe PID 1932 wrote to memory of 1376 1932 nhbyg.exe cmd.exe PID 1376 wrote to memory of 1360 1376 cmd.exe schtasks.exe PID 1376 wrote to memory of 1360 1376 cmd.exe schtasks.exe PID 1376 wrote to memory of 1360 1376 cmd.exe schtasks.exe PID 1376 wrote to memory of 1360 1376 cmd.exe schtasks.exe PID 1932 wrote to memory of 844 1932 nhbyg.exe cmd.exe PID 1932 wrote to memory of 844 1932 nhbyg.exe cmd.exe PID 1932 wrote to memory of 844 1932 nhbyg.exe cmd.exe PID 1932 wrote to memory of 844 1932 nhbyg.exe cmd.exe PID 1932 wrote to memory of 1596 1932 nhbyg.exe RegAsm.exe PID 1932 wrote to memory of 1596 1932 nhbyg.exe RegAsm.exe PID 1932 wrote to memory of 1596 1932 nhbyg.exe RegAsm.exe PID 1932 wrote to memory of 1596 1932 nhbyg.exe RegAsm.exe PID 1932 wrote to memory of 1596 1932 nhbyg.exe RegAsm.exe PID 1932 wrote to memory of 1596 1932 nhbyg.exe RegAsm.exe PID 1932 wrote to memory of 1596 1932 nhbyg.exe RegAsm.exe PID 1932 wrote to memory of 1596 1932 nhbyg.exe RegAsm.exe PID 1932 wrote to memory of 1596 1932 nhbyg.exe RegAsm.exe PID 1932 wrote to memory of 1596 1932 nhbyg.exe RegAsm.exe PID 1932 wrote to memory of 1596 1932 nhbyg.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JO37GDDJF5_ETRANSFER_RECEIPT.exe"C:\Users\Admin\AppData\Local\Temp\JO37GDDJF5_ETRANSFER_RECEIPT.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafdnasia" /tr "'C:\Users\Admin\AppData\Roaming\nhbyg.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdnasia" /tr "'C:\Users\Admin\AppData\Roaming\nhbyg.exe'" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\JO37GDDJF5_ETRANSFER_RECEIPT.exe" "C:\Users\Admin\AppData\Roaming\nhbyg.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\taskeng.exetaskeng.exe {72B16DA2-7844-4C7F-BF4E-0B8034C61616} S-1-5-21-1083475884-596052423-1669053738-1000:WYZSGDWS\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\nhbyg.exeC:\Users\Admin\AppData\Roaming\nhbyg.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafdnasia" /tr "'C:\Users\Admin\AppData\Roaming\nhbyg.exe'" /f3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdnasia" /tr "'C:\Users\Admin\AppData\Roaming\nhbyg.exe'" /f4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Roaming\nhbyg.exe" "C:\Users\Admin\AppData\Roaming\nhbyg.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\nhbyg.exeFilesize
73.1MB
MD543d541d1733f4c8989f2c56ea294637b
SHA1ae6e8e0f37ebdedfb94c4c8c478a9d18f5584326
SHA25603437456cf8d9bc10dbf25fd7a8ebd44e0f6184a3f1318b3f1edc006472b5b19
SHA51244a29b905bf66aec0b44116bdfb32e502d550abf31ea1d2845f9534cf10ba6a80edfa4ce87bb610a73eb3e34f052a1aff2590b4afb20c861321cce31832a7f16
-
C:\Users\Admin\AppData\Roaming\nhbyg.exeFilesize
73.2MB
MD504d5cd2a583e1111537f2d8cc5e58422
SHA10617a24e236b6a4362fa523e178e7cd0f1bb2ab1
SHA25611a81ff4786b229fb25b321c9a14258b8fe003a3d90e883ffa47366446749b13
SHA512a502a0db48cda1c2e53f10e016debb6bb6b3b42d26265082d249ccdbca498f845cce6ff77fdf6779c850b059529e8911698de1e74cb06d510723868ce1295826
-
memory/844-85-0x0000000000000000-mapping.dmp
-
memory/1360-84-0x0000000000000000-mapping.dmp
-
memory/1376-83-0x0000000000000000-mapping.dmp
-
memory/1596-99-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1596-98-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1596-91-0x00000000007E2730-mapping.dmp
-
memory/1760-61-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1760-82-0x00000000002A0000-0x00000000002AA000-memory.dmpFilesize
40KB
-
memory/1760-67-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1760-66-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1760-65-0x00000000007E2730-mapping.dmp
-
memory/1760-70-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1760-71-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1760-72-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1760-74-0x00000000002A0000-0x00000000002AA000-memory.dmpFilesize
40KB
-
memory/1760-73-0x00000000002A0000-0x00000000002AA000-memory.dmpFilesize
40KB
-
memory/1760-63-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1760-60-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1760-64-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1760-81-0x00000000002A0000-0x00000000002AA000-memory.dmpFilesize
40KB
-
memory/1760-80-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1764-54-0x0000000000120000-0x00000000002B4000-memory.dmpFilesize
1.6MB
-
memory/1764-56-0x0000000005200000-0x0000000005376000-memory.dmpFilesize
1.5MB
-
memory/1764-55-0x0000000076851000-0x0000000076853000-memory.dmpFilesize
8KB
-
memory/1932-78-0x00000000012A0000-0x0000000001434000-memory.dmpFilesize
1.6MB
-
memory/1932-76-0x0000000000000000-mapping.dmp
-
memory/1988-59-0x0000000000000000-mapping.dmp
-
memory/2008-58-0x0000000000000000-mapping.dmp
-
memory/2040-57-0x0000000000000000-mapping.dmp