Analysis
-
max time kernel
194s -
max time network
201s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
15-06-2022 16:51
Static task
static1
Behavioral task
behavioral1
Sample
JO37GDDJF5_ETRANSFER_RECEIPT.exe
Resource
win7-20220414-en
General
-
Target
JO37GDDJF5_ETRANSFER_RECEIPT.exe
-
Size
300.0MB
-
MD5
9f791a0a9f76db609b44f0e3bf7bdef5
-
SHA1
0481f2e178c7a34b3d855e5c53553337fe2008ed
-
SHA256
ccd71d751bf017dee31f76eceded9aa6832f5e19b5389584d3665f76b4f0caf2
-
SHA512
06889bebdf092e4f1563e697e9c619a147954ffcb1f9dd9e9a9238d1410442373f95558c02e6bae6f5d832f89a46eab8b08114699f7321ce2e1150a69f1ad1ee
Malware Config
Extracted
bitrat
1.38
bitrat9300.duckdns.org:9300
-
communication_password
e10adc3949ba59abbe56e057f20f883e
-
tor_process
tor
Signatures
-
suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
-
Executes dropped EXE 1 IoCs
Processes:
nhbyg.exepid process 4460 nhbyg.exe -
Processes:
resource yara_rule behavioral2/memory/3540-136-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3540-138-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3540-137-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3540-139-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3540-140-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3540-143-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4192-153-0x0000000000760000-0x0000000000B44000-memory.dmp upx behavioral2/memory/4192-154-0x0000000000760000-0x0000000000B44000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
RegAsm.exepid process 3540 RegAsm.exe 3540 RegAsm.exe 3540 RegAsm.exe 3540 RegAsm.exe 3540 RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
JO37GDDJF5_ETRANSFER_RECEIPT.exedescription pid process target process PID 388 set thread context of 3540 388 JO37GDDJF5_ETRANSFER_RECEIPT.exe RegAsm.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4312 schtasks.exe 3224 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegAsm.exedescription pid process Token: SeShutdownPrivilege 3540 RegAsm.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
RegAsm.exepid process 3540 RegAsm.exe 3540 RegAsm.exe -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
JO37GDDJF5_ETRANSFER_RECEIPT.execmd.exenhbyg.execmd.exedescription pid process target process PID 388 wrote to memory of 4744 388 JO37GDDJF5_ETRANSFER_RECEIPT.exe cmd.exe PID 388 wrote to memory of 4744 388 JO37GDDJF5_ETRANSFER_RECEIPT.exe cmd.exe PID 388 wrote to memory of 4744 388 JO37GDDJF5_ETRANSFER_RECEIPT.exe cmd.exe PID 4744 wrote to memory of 4312 4744 cmd.exe schtasks.exe PID 4744 wrote to memory of 4312 4744 cmd.exe schtasks.exe PID 4744 wrote to memory of 4312 4744 cmd.exe schtasks.exe PID 388 wrote to memory of 4000 388 JO37GDDJF5_ETRANSFER_RECEIPT.exe cmd.exe PID 388 wrote to memory of 4000 388 JO37GDDJF5_ETRANSFER_RECEIPT.exe cmd.exe PID 388 wrote to memory of 4000 388 JO37GDDJF5_ETRANSFER_RECEIPT.exe cmd.exe PID 388 wrote to memory of 3540 388 JO37GDDJF5_ETRANSFER_RECEIPT.exe RegAsm.exe PID 388 wrote to memory of 3540 388 JO37GDDJF5_ETRANSFER_RECEIPT.exe RegAsm.exe PID 388 wrote to memory of 3540 388 JO37GDDJF5_ETRANSFER_RECEIPT.exe RegAsm.exe PID 388 wrote to memory of 3540 388 JO37GDDJF5_ETRANSFER_RECEIPT.exe RegAsm.exe PID 388 wrote to memory of 3540 388 JO37GDDJF5_ETRANSFER_RECEIPT.exe RegAsm.exe PID 388 wrote to memory of 3540 388 JO37GDDJF5_ETRANSFER_RECEIPT.exe RegAsm.exe PID 388 wrote to memory of 3540 388 JO37GDDJF5_ETRANSFER_RECEIPT.exe RegAsm.exe PID 4460 wrote to memory of 4456 4460 nhbyg.exe cmd.exe PID 4460 wrote to memory of 4456 4460 nhbyg.exe cmd.exe PID 4460 wrote to memory of 4456 4460 nhbyg.exe cmd.exe PID 4456 wrote to memory of 3224 4456 cmd.exe schtasks.exe PID 4456 wrote to memory of 3224 4456 cmd.exe schtasks.exe PID 4456 wrote to memory of 3224 4456 cmd.exe schtasks.exe PID 4460 wrote to memory of 2924 4460 nhbyg.exe cmd.exe PID 4460 wrote to memory of 2924 4460 nhbyg.exe cmd.exe PID 4460 wrote to memory of 2924 4460 nhbyg.exe cmd.exe PID 4460 wrote to memory of 4192 4460 nhbyg.exe RegAsm.exe PID 4460 wrote to memory of 4192 4460 nhbyg.exe RegAsm.exe PID 4460 wrote to memory of 4192 4460 nhbyg.exe RegAsm.exe PID 4460 wrote to memory of 4192 4460 nhbyg.exe RegAsm.exe PID 4460 wrote to memory of 4192 4460 nhbyg.exe RegAsm.exe PID 4460 wrote to memory of 4192 4460 nhbyg.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JO37GDDJF5_ETRANSFER_RECEIPT.exe"C:\Users\Admin\AppData\Local\Temp\JO37GDDJF5_ETRANSFER_RECEIPT.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafdnasia" /tr "'C:\Users\Admin\AppData\Roaming\nhbyg.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdnasia" /tr "'C:\Users\Admin\AppData\Roaming\nhbyg.exe'" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\JO37GDDJF5_ETRANSFER_RECEIPT.exe" "C:\Users\Admin\AppData\Roaming\nhbyg.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Roaming\nhbyg.exeC:\Users\Admin\AppData\Roaming\nhbyg.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafdnasia" /tr "'C:\Users\Admin\AppData\Roaming\nhbyg.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdnasia" /tr "'C:\Users\Admin\AppData\Roaming\nhbyg.exe'" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Roaming\nhbyg.exe" "C:\Users\Admin\AppData\Roaming\nhbyg.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\nhbyg.exeFilesize
83.2MB
MD512fa6a8f5192360158a1670ef3b4b5da
SHA103ca11d5124150b088802503aeafe646dfa1edeb
SHA256822caddcc3003060c08ffb02a8af06b7f8ffe49e8a95f8d3769197ebe075cf8b
SHA512a577520ba1caf64d9459f0019ecc13d6789db8889716d603a21dcbbea02394d11ff9ca568d6bbd6ce44c4dee7e4f708686ed230ce82df9e26a7afd5426b8dc05
-
C:\Users\Admin\AppData\Roaming\nhbyg.exeFilesize
73.9MB
MD5e78a0efd39cdc6b37da5ed1712f5a04a
SHA1bc637533f9c958d28d6ef0293a44551bb9b55da0
SHA256dd8369447227091f2cc6afd4b345ad27ecc8ab3f68a00f6ec0384add30faf2c0
SHA512a0982f186fd989a1ff21bab3a34ee01266bfd5700865bd97707aea2b5970dfe03cd7a6a30fa5ccc4d40d141271470596add4a654876f837503a5902f9d4dac5a
-
memory/388-130-0x0000000000080000-0x0000000000214000-memory.dmpFilesize
1.6MB
-
memory/388-133-0x00000000056A0000-0x0000000005C44000-memory.dmpFilesize
5.6MB
-
memory/2924-150-0x0000000000000000-mapping.dmp
-
memory/3224-149-0x0000000000000000-mapping.dmp
-
memory/3540-142-0x0000000075270000-0x00000000752A9000-memory.dmpFilesize
228KB
-
memory/3540-147-0x0000000074ED0000-0x0000000074F09000-memory.dmpFilesize
228KB
-
memory/3540-137-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/3540-139-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/3540-140-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/3540-141-0x0000000074ED0000-0x0000000074F09000-memory.dmpFilesize
228KB
-
memory/3540-136-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/3540-143-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/3540-135-0x0000000000000000-mapping.dmp
-
memory/3540-138-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/3540-148-0x0000000075270000-0x00000000752A9000-memory.dmpFilesize
228KB
-
memory/4000-134-0x0000000000000000-mapping.dmp
-
memory/4192-151-0x0000000000000000-mapping.dmp
-
memory/4192-153-0x0000000000760000-0x0000000000B44000-memory.dmpFilesize
3.9MB
-
memory/4192-154-0x0000000000760000-0x0000000000B44000-memory.dmpFilesize
3.9MB
-
memory/4312-132-0x0000000000000000-mapping.dmp
-
memory/4456-146-0x0000000000000000-mapping.dmp
-
memory/4744-131-0x0000000000000000-mapping.dmp