Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
09-09-2022 17:09
Static task
static1
Behavioral task
behavioral1
Sample
BILLPAYM.exe
Resource
win7-20220812-en
General
-
Target
BILLPAYM.exe
-
Size
300.0MB
-
MD5
41d8a777ddc40a009a046f88900c0b80
-
SHA1
25dfd72ffe79eb5884d27fead86f4886bed638de
-
SHA256
e6844a84f9210b5803147c158c841404331177bf409dab05fecb3b3303d50347
-
SHA512
e75f3bfc85ed1def013474d61d5ee936ce36f499e0e111a7a1264180b7c7cc0b9a35469c35549e14c5efccc105db509aa5935152aab4e028b038e12b126f4514
-
SSDEEP
24576:R+GQ7D8nXiNeGFPQKpFCjI/teJb2Q/eF2YlIECXRPbSVKcS2nOI3lqaNJJxEJYsO:R+GaeGtpFC8/mb9ejKulkPaNJo
Malware Config
Extracted
bitrat
1.38
newbithere.duckdns.org:2005
-
communication_password
827ccb0eea8a706c4c34a16891f84e7b
-
tor_process
tor
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
Windows.exeWindows.exepid process 652 Windows.exe 1092 Windows.exe -
Processes:
resource yara_rule behavioral1/memory/1748-60-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1748-62-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1748-63-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1748-65-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1748-66-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1748-69-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1748-70-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1748-71-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1748-74-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1644-97-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1644-98-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1064-112-0x00000000004D0000-0x00000000008B4000-memory.dmp upx behavioral1/memory/1064-113-0x00000000004D0000-0x00000000008B4000-memory.dmp upx behavioral1/memory/1064-116-0x00000000004D0000-0x00000000008B4000-memory.dmp upx behavioral1/memory/1064-118-0x00000000004D0000-0x00000000008B4000-memory.dmp upx behavioral1/memory/1064-119-0x00000000004D0000-0x00000000008B4000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
Processes:
RegAsm.exeRegAsm.exeRegAsm.exepid process 1748 RegAsm.exe 1748 RegAsm.exe 1748 RegAsm.exe 1748 RegAsm.exe 1748 RegAsm.exe 1644 RegAsm.exe 1064 RegAsm.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
BILLPAYM.exeWindows.exeWindows.exedescription pid process target process PID 1788 set thread context of 1748 1788 BILLPAYM.exe RegAsm.exe PID 652 set thread context of 1644 652 Windows.exe RegAsm.exe PID 1092 set thread context of 1064 1092 Windows.exe RegAsm.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 1532 schtasks.exe 276 schtasks.exe 1788 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
RegAsm.exeRegAsm.exeRegAsm.exedescription pid process Token: SeDebugPrivilege 1748 RegAsm.exe Token: SeShutdownPrivilege 1748 RegAsm.exe Token: SeDebugPrivilege 1644 RegAsm.exe Token: SeShutdownPrivilege 1644 RegAsm.exe Token: SeDebugPrivilege 1064 RegAsm.exe Token: SeShutdownPrivilege 1064 RegAsm.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
RegAsm.exepid process 1748 RegAsm.exe 1748 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
BILLPAYM.execmd.exetaskeng.exeWindows.execmd.exeWindows.execmd.exedescription pid process target process PID 1788 wrote to memory of 1628 1788 BILLPAYM.exe cmd.exe PID 1788 wrote to memory of 1628 1788 BILLPAYM.exe cmd.exe PID 1788 wrote to memory of 1628 1788 BILLPAYM.exe cmd.exe PID 1788 wrote to memory of 1628 1788 BILLPAYM.exe cmd.exe PID 1788 wrote to memory of 948 1788 BILLPAYM.exe cmd.exe PID 1788 wrote to memory of 948 1788 BILLPAYM.exe cmd.exe PID 1788 wrote to memory of 948 1788 BILLPAYM.exe cmd.exe PID 1788 wrote to memory of 948 1788 BILLPAYM.exe cmd.exe PID 1628 wrote to memory of 1532 1628 cmd.exe schtasks.exe PID 1628 wrote to memory of 1532 1628 cmd.exe schtasks.exe PID 1628 wrote to memory of 1532 1628 cmd.exe schtasks.exe PID 1628 wrote to memory of 1532 1628 cmd.exe schtasks.exe PID 1788 wrote to memory of 1748 1788 BILLPAYM.exe RegAsm.exe PID 1788 wrote to memory of 1748 1788 BILLPAYM.exe RegAsm.exe PID 1788 wrote to memory of 1748 1788 BILLPAYM.exe RegAsm.exe PID 1788 wrote to memory of 1748 1788 BILLPAYM.exe RegAsm.exe PID 1788 wrote to memory of 1748 1788 BILLPAYM.exe RegAsm.exe PID 1788 wrote to memory of 1748 1788 BILLPAYM.exe RegAsm.exe PID 1788 wrote to memory of 1748 1788 BILLPAYM.exe RegAsm.exe PID 1788 wrote to memory of 1748 1788 BILLPAYM.exe RegAsm.exe PID 1788 wrote to memory of 1748 1788 BILLPAYM.exe RegAsm.exe PID 1788 wrote to memory of 1748 1788 BILLPAYM.exe RegAsm.exe PID 1788 wrote to memory of 1748 1788 BILLPAYM.exe RegAsm.exe PID 808 wrote to memory of 652 808 taskeng.exe Windows.exe PID 808 wrote to memory of 652 808 taskeng.exe Windows.exe PID 808 wrote to memory of 652 808 taskeng.exe Windows.exe PID 808 wrote to memory of 652 808 taskeng.exe Windows.exe PID 652 wrote to memory of 1400 652 Windows.exe cmd.exe PID 652 wrote to memory of 1400 652 Windows.exe cmd.exe PID 652 wrote to memory of 1400 652 Windows.exe cmd.exe PID 652 wrote to memory of 1400 652 Windows.exe cmd.exe PID 652 wrote to memory of 1188 652 Windows.exe cmd.exe PID 652 wrote to memory of 1188 652 Windows.exe cmd.exe PID 652 wrote to memory of 1188 652 Windows.exe cmd.exe PID 652 wrote to memory of 1188 652 Windows.exe cmd.exe PID 1400 wrote to memory of 276 1400 cmd.exe schtasks.exe PID 1400 wrote to memory of 276 1400 cmd.exe schtasks.exe PID 1400 wrote to memory of 276 1400 cmd.exe schtasks.exe PID 1400 wrote to memory of 276 1400 cmd.exe schtasks.exe PID 652 wrote to memory of 1644 652 Windows.exe RegAsm.exe PID 652 wrote to memory of 1644 652 Windows.exe RegAsm.exe PID 652 wrote to memory of 1644 652 Windows.exe RegAsm.exe PID 652 wrote to memory of 1644 652 Windows.exe RegAsm.exe PID 652 wrote to memory of 1644 652 Windows.exe RegAsm.exe PID 652 wrote to memory of 1644 652 Windows.exe RegAsm.exe PID 652 wrote to memory of 1644 652 Windows.exe RegAsm.exe PID 652 wrote to memory of 1644 652 Windows.exe RegAsm.exe PID 652 wrote to memory of 1644 652 Windows.exe RegAsm.exe PID 652 wrote to memory of 1644 652 Windows.exe RegAsm.exe PID 652 wrote to memory of 1644 652 Windows.exe RegAsm.exe PID 808 wrote to memory of 1092 808 taskeng.exe Windows.exe PID 808 wrote to memory of 1092 808 taskeng.exe Windows.exe PID 808 wrote to memory of 1092 808 taskeng.exe Windows.exe PID 808 wrote to memory of 1092 808 taskeng.exe Windows.exe PID 1092 wrote to memory of 1556 1092 Windows.exe cmd.exe PID 1092 wrote to memory of 1556 1092 Windows.exe cmd.exe PID 1092 wrote to memory of 1556 1092 Windows.exe cmd.exe PID 1092 wrote to memory of 1556 1092 Windows.exe cmd.exe PID 1092 wrote to memory of 1452 1092 Windows.exe cmd.exe PID 1092 wrote to memory of 1452 1092 Windows.exe cmd.exe PID 1092 wrote to memory of 1452 1092 Windows.exe cmd.exe PID 1092 wrote to memory of 1452 1092 Windows.exe cmd.exe PID 1556 wrote to memory of 1788 1556 cmd.exe schtasks.exe PID 1556 wrote to memory of 1788 1556 cmd.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\BILLPAYM.exe"C:\Users\Admin\AppData\Local\Temp\BILLPAYM.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\Windows.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\Windows.exe'" /f3⤵
- Creates scheduled task(s)
PID:1532 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\BILLPAYM.exe" "C:\Users\Admin\AppData\Roaming\Windows.exe"2⤵PID:948
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1748
-
C:\Windows\system32\taskeng.exetaskeng.exe {C336E429-4AB5-4BC0-B915-D97DAE9FA75A} S-1-5-21-3845472200-3839195424-595303356-1000:ZERMMMDR\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Roaming\Windows.exeC:\Users\Admin\AppData\Roaming\Windows.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\Windows.exe'" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\Windows.exe'" /f4⤵
- Creates scheduled task(s)
PID:276 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\Windows.exe" "C:\Users\Admin\AppData\Roaming\Windows.exe"3⤵PID:1188
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1644 -
C:\Users\Admin\AppData\Roaming\Windows.exeC:\Users\Admin\AppData\Roaming\Windows.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\Windows.exe'" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\Windows.exe'" /f4⤵
- Creates scheduled task(s)
PID:1788 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\Windows.exe" "C:\Users\Admin\AppData\Roaming\Windows.exe"3⤵PID:1452
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1064
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300.0MB
MD541d8a777ddc40a009a046f88900c0b80
SHA125dfd72ffe79eb5884d27fead86f4886bed638de
SHA256e6844a84f9210b5803147c158c841404331177bf409dab05fecb3b3303d50347
SHA512e75f3bfc85ed1def013474d61d5ee936ce36f499e0e111a7a1264180b7c7cc0b9a35469c35549e14c5efccc105db509aa5935152aab4e028b038e12b126f4514
-
Filesize
300.0MB
MD541d8a777ddc40a009a046f88900c0b80
SHA125dfd72ffe79eb5884d27fead86f4886bed638de
SHA256e6844a84f9210b5803147c158c841404331177bf409dab05fecb3b3303d50347
SHA512e75f3bfc85ed1def013474d61d5ee936ce36f499e0e111a7a1264180b7c7cc0b9a35469c35549e14c5efccc105db509aa5935152aab4e028b038e12b126f4514
-
Filesize
300.0MB
MD541d8a777ddc40a009a046f88900c0b80
SHA125dfd72ffe79eb5884d27fead86f4886bed638de
SHA256e6844a84f9210b5803147c158c841404331177bf409dab05fecb3b3303d50347
SHA512e75f3bfc85ed1def013474d61d5ee936ce36f499e0e111a7a1264180b7c7cc0b9a35469c35549e14c5efccc105db509aa5935152aab4e028b038e12b126f4514