Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
27-06-2022 10:55
General
-
Target
9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c.exe
-
Size
1.4MB
-
MD5
88992f8dbb079ae5f9754ed265c02f55
-
SHA1
c05d4025024da67569c53afabbdda51dabae6521
-
SHA256
9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c
-
SHA512
83e02f354a883fa35431b86e41c875e4b3ba4664ab60eb677273bda514b079a9d075a51c1c933106a2c3da330ac22599a4a4ecfaac4dc62a8f41806d698ed911
Malware Config
Extracted
bitrat
1.38
wer89.duckdns.org:2222
-
communication_password
653d716345d8915046b904b90f41f271
-
tor_process
tor
Signatures
-
suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000600000001ac2b-304.dat acprotect behavioral1/files/0x000600000001ac2b-305.dat acprotect -
resource yara_rule behavioral1/memory/2188-127-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2188-184-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/160-252-0x0000000000400000-0x00000000008DC000-memory.dmp upx behavioral1/memory/160-255-0x0000000000400000-0x00000000008DC000-memory.dmp upx behavioral1/memory/160-340-0x0000000000400000-0x00000000008DC000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 4092 9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts 9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2188 9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c.exe 2188 9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c.exe 2188 9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c.exe 2188 9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c.exe 2188 9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2188 set thread context of 160 2188 9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c.exe 67 PID 160 set thread context of 4092 160 9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c.exe 68 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4092 9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c.exe 4092 9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2188 9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c.exe Token: SeDebugPrivilege 4092 9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2188 9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c.exe 2188 9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2188 wrote to memory of 160 2188 9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c.exe 67 PID 2188 wrote to memory of 160 2188 9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c.exe 67 PID 2188 wrote to memory of 160 2188 9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c.exe 67 PID 2188 wrote to memory of 160 2188 9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c.exe 67 PID 2188 wrote to memory of 160 2188 9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c.exe 67 PID 2188 wrote to memory of 160 2188 9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c.exe 67 PID 2188 wrote to memory of 160 2188 9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c.exe 67 PID 2188 wrote to memory of 160 2188 9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c.exe 67 PID 160 wrote to memory of 4092 160 9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c.exe 68 PID 160 wrote to memory of 4092 160 9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c.exe 68 PID 160 wrote to memory of 4092 160 9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c.exe 68 PID 160 wrote to memory of 4092 160 9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c.exe 68 PID 160 wrote to memory of 4092 160 9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c.exe 68 PID 160 wrote to memory of 4092 160 9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c.exe 68 PID 160 wrote to memory of 4092 160 9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c.exe 68 PID 160 wrote to memory of 4092 160 9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c.exe"C:\Users\Admin\AppData\Local\Temp\9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c.exe-a "C:\Users\Admin\AppData\Local\16172dee\plg\3oAzPKIt.json"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:160 -
C:\Users\Admin\AppData\Local\Temp\9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c.exe-a "C:\Users\Admin\AppData\Local\Temp\unk.xml"3⤵
- Loads dropped DLL
- Accesses Microsoft Outlook accounts
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4092
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD577e6621fd939338d3f19f3dd948ecf43
SHA153df8b3a76c5d6c35a99aa7759ff3bd7ec46588c
SHA2569cb90c1d5c31396519b1f6c73899c062b6ccbd9a8cfc7c0bb054fe88c7825867
SHA5126e812be4c3b958f0497f91e0eb2e8b77d4a13e2b7af750a30ec9bff3dde09a233b5510ee6333a9ab3182c11ab6c3d38789921d517449c6a03164e216cee43c4f
-
Filesize
104B
MD54f3bde9212e17ef18226866d6ac739b6
SHA1732733bec8314beb81437e60876ffa75e72ae6cd
SHA256212173a405c78d70f90e8ec0699a60ed2f4a9f3a8070de62eabd666c268fb174
SHA51210b7cdae0b9a7b0f8e1bfc66a60675fa9b25c523864d5ae3da243f4e6e4c5194f3bd92af57ac956157442f66414bdd3393d0a1e5ba4ef0f192561e8524d4e744
-
Filesize
104B
MD5bf5da170f7c9a8eae88d1cb1a191ff80
SHA1dd1b991a1b03587a5d1edc94e919a2070e325610
SHA256e5d5110feb21939d82d962981aeaaafc4643b40a9b87cbed800ace82135d57cd
SHA5129e32247d8556fd6efffbf7b6b9c325652d8c4b223b0fa38020879171476a49ab1f64d8897b5d8d92b79c5484fd9d5899be26ca5f664ee1f9c2acb0857084121e
-
Filesize
793KB
MD586114faba7e1ec4a667d2bcb2e23f024
SHA1670df6e1ba1dc6bece046e8b2e573dd36748245e
SHA256568da887725ccfdc4c5aae3ff66792fe60eca4e0818338f6a8434be66a6fe46d
SHA512d26ee0da6ccd4022982cf848c46e40f6781b667e39d0c5daf5ea8d74c44e55c55a5f7590a4d2a60aa1911358ca783c4276a9b4e6311c4cea20df1ebd4f7f457f
-
Filesize
1KB
MD577e6621fd939338d3f19f3dd948ecf43
SHA153df8b3a76c5d6c35a99aa7759ff3bd7ec46588c
SHA2569cb90c1d5c31396519b1f6c73899c062b6ccbd9a8cfc7c0bb054fe88c7825867
SHA5126e812be4c3b958f0497f91e0eb2e8b77d4a13e2b7af750a30ec9bff3dde09a233b5510ee6333a9ab3182c11ab6c3d38789921d517449c6a03164e216cee43c4f
-
Filesize
793KB
MD586114faba7e1ec4a667d2bcb2e23f024
SHA1670df6e1ba1dc6bece046e8b2e573dd36748245e
SHA256568da887725ccfdc4c5aae3ff66792fe60eca4e0818338f6a8434be66a6fe46d
SHA512d26ee0da6ccd4022982cf848c46e40f6781b667e39d0c5daf5ea8d74c44e55c55a5f7590a4d2a60aa1911358ca783c4276a9b4e6311c4cea20df1ebd4f7f457f