Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
14-07-2022 17:07
Static task
static1
Behavioral task
behavioral1
Sample
5d7d0a5904199e6196c09c6cddf091dc.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
5d7d0a5904199e6196c09c6cddf091dc.exe
Resource
win10v2004-20220414-en
General
-
Target
5d7d0a5904199e6196c09c6cddf091dc.exe
-
Size
1.0MB
-
MD5
5d7d0a5904199e6196c09c6cddf091dc
-
SHA1
037b6bcd6c82f80acf1062dcb56e29eb34fd450a
-
SHA256
b8f3a767a3ec216bd009cd4b75e20b5b3daaafff409ced7b3ae6c6a05854342d
-
SHA512
068412a7e2afbab702dd6edc73ef91d785fd2499c4a8546e26165b2d5b0663d8dbc385c978cc085d60fbb5860e559545ad60bc8f2f0ab2f146573cb95803c806
Malware Config
Extracted
bitrat
1.38
bendecidobendiciones.con-ip.com:3005
-
communication_password
202cb962ac59075b964b07152d234b70
-
tor_process
tor
Signatures
-
suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
-
Processes:
resource yara_rule behavioral2/memory/2508-141-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/2508-142-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/2508-143-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/2508-145-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/2508-144-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/2508-148-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5d7d0a5904199e6196c09c6cddf091dc.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation 5d7d0a5904199e6196c09c6cddf091dc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
5d7d0a5904199e6196c09c6cddf091dc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ccxxegmd = "\"C:\\Users\\Admin\\AppData\\Roaming\\Duwsn\\Ccxxegmd.exe\"" 5d7d0a5904199e6196c09c6cddf091dc.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
InstallUtil.exepid process 2508 InstallUtil.exe 2508 InstallUtil.exe 2508 InstallUtil.exe 2508 InstallUtil.exe 2508 InstallUtil.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
5d7d0a5904199e6196c09c6cddf091dc.exedescription pid process target process PID 1496 set thread context of 2508 1496 5d7d0a5904199e6196c09c6cddf091dc.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exe5d7d0a5904199e6196c09c6cddf091dc.exepid process 1504 powershell.exe 1504 powershell.exe 1496 5d7d0a5904199e6196c09c6cddf091dc.exe 1496 5d7d0a5904199e6196c09c6cddf091dc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
5d7d0a5904199e6196c09c6cddf091dc.exepowershell.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 1496 5d7d0a5904199e6196c09c6cddf091dc.exe Token: SeDebugPrivilege 1504 powershell.exe Token: SeShutdownPrivilege 2508 InstallUtil.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
InstallUtil.exepid process 2508 InstallUtil.exe 2508 InstallUtil.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
5d7d0a5904199e6196c09c6cddf091dc.exedescription pid process target process PID 1496 wrote to memory of 1504 1496 5d7d0a5904199e6196c09c6cddf091dc.exe powershell.exe PID 1496 wrote to memory of 1504 1496 5d7d0a5904199e6196c09c6cddf091dc.exe powershell.exe PID 1496 wrote to memory of 1504 1496 5d7d0a5904199e6196c09c6cddf091dc.exe powershell.exe PID 1496 wrote to memory of 2508 1496 5d7d0a5904199e6196c09c6cddf091dc.exe InstallUtil.exe PID 1496 wrote to memory of 2508 1496 5d7d0a5904199e6196c09c6cddf091dc.exe InstallUtil.exe PID 1496 wrote to memory of 2508 1496 5d7d0a5904199e6196c09c6cddf091dc.exe InstallUtil.exe PID 1496 wrote to memory of 2508 1496 5d7d0a5904199e6196c09c6cddf091dc.exe InstallUtil.exe PID 1496 wrote to memory of 2508 1496 5d7d0a5904199e6196c09c6cddf091dc.exe InstallUtil.exe PID 1496 wrote to memory of 2508 1496 5d7d0a5904199e6196c09c6cddf091dc.exe InstallUtil.exe PID 1496 wrote to memory of 2508 1496 5d7d0a5904199e6196c09c6cddf091dc.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d7d0a5904199e6196c09c6cddf091dc.exe"C:\Users\Admin\AppData\Local\Temp\5d7d0a5904199e6196c09c6cddf091dc.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2508
-