Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2022 17:09
Static task
static1
Behavioral task
behavioral1
Sample
BILLPAYM.exe
Resource
win7-20220812-en
General
-
Target
BILLPAYM.exe
-
Size
300.0MB
-
MD5
41d8a777ddc40a009a046f88900c0b80
-
SHA1
25dfd72ffe79eb5884d27fead86f4886bed638de
-
SHA256
e6844a84f9210b5803147c158c841404331177bf409dab05fecb3b3303d50347
-
SHA512
e75f3bfc85ed1def013474d61d5ee936ce36f499e0e111a7a1264180b7c7cc0b9a35469c35549e14c5efccc105db509aa5935152aab4e028b038e12b126f4514
-
SSDEEP
24576:R+GQ7D8nXiNeGFPQKpFCjI/teJb2Q/eF2YlIECXRPbSVKcS2nOI3lqaNJJxEJYsO:R+GaeGtpFC8/mb9ejKulkPaNJo
Malware Config
Extracted
bitrat
1.38
newbithere.duckdns.org:2005
-
communication_password
827ccb0eea8a706c4c34a16891f84e7b
-
tor_process
tor
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
Windows.exeWindows.exepid process 2364 Windows.exe 836 Windows.exe -
Processes:
resource yara_rule behavioral2/memory/4492-140-0x0000000000900000-0x0000000000CE4000-memory.dmp upx behavioral2/memory/4492-141-0x0000000000900000-0x0000000000CE4000-memory.dmp upx behavioral2/memory/1576-149-0x00000000005B0000-0x0000000000994000-memory.dmp upx behavioral2/memory/1576-150-0x00000000005B0000-0x0000000000994000-memory.dmp upx behavioral2/memory/2620-157-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/2620-158-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/2620-159-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/2620-160-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/2620-161-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/2620-162-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
RegAsm.exepid process 2620 RegAsm.exe 2620 RegAsm.exe 2620 RegAsm.exe 2620 RegAsm.exe 2620 RegAsm.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
BILLPAYM.exeWindows.exeWindows.exedescription pid process target process PID 4744 set thread context of 4492 4744 BILLPAYM.exe RegAsm.exe PID 2364 set thread context of 1576 2364 Windows.exe RegAsm.exe PID 836 set thread context of 2620 836 Windows.exe RegAsm.exe -
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1276 4492 WerFault.exe RegAsm.exe 4236 1576 WerFault.exe RegAsm.exe 3880 1576 WerFault.exe RegAsm.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 2580 schtasks.exe 1700 schtasks.exe 544 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegAsm.exedescription pid process Token: SeShutdownPrivilege 2620 RegAsm.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
RegAsm.exepid process 2620 RegAsm.exe 2620 RegAsm.exe -
Suspicious use of WriteProcessMemory 48 IoCs
Processes:
BILLPAYM.execmd.exeWindows.execmd.exeWindows.execmd.exedescription pid process target process PID 4744 wrote to memory of 1856 4744 BILLPAYM.exe cmd.exe PID 4744 wrote to memory of 1856 4744 BILLPAYM.exe cmd.exe PID 4744 wrote to memory of 1856 4744 BILLPAYM.exe cmd.exe PID 4744 wrote to memory of 640 4744 BILLPAYM.exe cmd.exe PID 4744 wrote to memory of 640 4744 BILLPAYM.exe cmd.exe PID 4744 wrote to memory of 640 4744 BILLPAYM.exe cmd.exe PID 1856 wrote to memory of 2580 1856 cmd.exe schtasks.exe PID 1856 wrote to memory of 2580 1856 cmd.exe schtasks.exe PID 1856 wrote to memory of 2580 1856 cmd.exe schtasks.exe PID 4744 wrote to memory of 4492 4744 BILLPAYM.exe RegAsm.exe PID 4744 wrote to memory of 4492 4744 BILLPAYM.exe RegAsm.exe PID 4744 wrote to memory of 4492 4744 BILLPAYM.exe RegAsm.exe PID 4744 wrote to memory of 4492 4744 BILLPAYM.exe RegAsm.exe PID 4744 wrote to memory of 4492 4744 BILLPAYM.exe RegAsm.exe PID 4744 wrote to memory of 4492 4744 BILLPAYM.exe RegAsm.exe PID 4744 wrote to memory of 4492 4744 BILLPAYM.exe RegAsm.exe PID 2364 wrote to memory of 4056 2364 Windows.exe cmd.exe PID 2364 wrote to memory of 4056 2364 Windows.exe cmd.exe PID 2364 wrote to memory of 4056 2364 Windows.exe cmd.exe PID 2364 wrote to memory of 944 2364 Windows.exe cmd.exe PID 2364 wrote to memory of 944 2364 Windows.exe cmd.exe PID 2364 wrote to memory of 944 2364 Windows.exe cmd.exe PID 2364 wrote to memory of 1576 2364 Windows.exe RegAsm.exe PID 2364 wrote to memory of 1576 2364 Windows.exe RegAsm.exe PID 2364 wrote to memory of 1576 2364 Windows.exe RegAsm.exe PID 2364 wrote to memory of 1576 2364 Windows.exe RegAsm.exe PID 2364 wrote to memory of 1576 2364 Windows.exe RegAsm.exe PID 2364 wrote to memory of 1576 2364 Windows.exe RegAsm.exe PID 2364 wrote to memory of 1576 2364 Windows.exe RegAsm.exe PID 4056 wrote to memory of 1700 4056 cmd.exe schtasks.exe PID 4056 wrote to memory of 1700 4056 cmd.exe schtasks.exe PID 4056 wrote to memory of 1700 4056 cmd.exe schtasks.exe PID 836 wrote to memory of 1724 836 Windows.exe cmd.exe PID 836 wrote to memory of 1724 836 Windows.exe cmd.exe PID 836 wrote to memory of 1724 836 Windows.exe cmd.exe PID 836 wrote to memory of 4840 836 Windows.exe cmd.exe PID 836 wrote to memory of 4840 836 Windows.exe cmd.exe PID 836 wrote to memory of 4840 836 Windows.exe cmd.exe PID 1724 wrote to memory of 544 1724 cmd.exe schtasks.exe PID 1724 wrote to memory of 544 1724 cmd.exe schtasks.exe PID 1724 wrote to memory of 544 1724 cmd.exe schtasks.exe PID 836 wrote to memory of 2620 836 Windows.exe RegAsm.exe PID 836 wrote to memory of 2620 836 Windows.exe RegAsm.exe PID 836 wrote to memory of 2620 836 Windows.exe RegAsm.exe PID 836 wrote to memory of 2620 836 Windows.exe RegAsm.exe PID 836 wrote to memory of 2620 836 Windows.exe RegAsm.exe PID 836 wrote to memory of 2620 836 Windows.exe RegAsm.exe PID 836 wrote to memory of 2620 836 Windows.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\BILLPAYM.exe"C:\Users\Admin\AppData\Local\Temp\BILLPAYM.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\Windows.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\Windows.exe'" /f3⤵
- Creates scheduled task(s)
PID:2580 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\BILLPAYM.exe" "C:\Users\Admin\AppData\Roaming\Windows.exe"2⤵PID:640
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:4492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 5403⤵
- Program crash
PID:1276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4492 -ip 44921⤵PID:3464
-
C:\Users\Admin\AppData\Roaming\Windows.exeC:\Users\Admin\AppData\Roaming\Windows.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\Windows.exe" "C:\Users\Admin\AppData\Roaming\Windows.exe"2⤵PID:944
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\Windows.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\Windows.exe'" /f3⤵
- Creates scheduled task(s)
PID:1700 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:1576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1576 -s 5363⤵
- Program crash
PID:4236 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1576 -s 5403⤵
- Program crash
PID:3880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1576 -ip 15761⤵PID:2832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1576 -ip 15761⤵PID:3864
-
C:\Users\Admin\AppData\Roaming\Windows.exeC:\Users\Admin\AppData\Roaming\Windows.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\Windows.exe" "C:\Users\Admin\AppData\Roaming\Windows.exe"2⤵PID:4840
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\Windows.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\Windows.exe'" /f3⤵
- Creates scheduled task(s)
PID:544 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2620
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
612B
MD52a9d08fe8550d5c1bd2234a9bba5f499
SHA1002f0e108e5b1141f507b7e6851b6778a749e223
SHA256af40b88a9082d1a47f6339d384de9a1936fca4bf8013826bbae4606c988713dd
SHA5127a0e924ac0209566d7bd63529a9732bd87b4981209bcd7038df61fa9990768d6a7882a18067cd6f1dd5c034f835ca6f0c3da2c6d78ff822165e2027f5d86aedf
-
Filesize
300.0MB
MD541d8a777ddc40a009a046f88900c0b80
SHA125dfd72ffe79eb5884d27fead86f4886bed638de
SHA256e6844a84f9210b5803147c158c841404331177bf409dab05fecb3b3303d50347
SHA512e75f3bfc85ed1def013474d61d5ee936ce36f499e0e111a7a1264180b7c7cc0b9a35469c35549e14c5efccc105db509aa5935152aab4e028b038e12b126f4514
-
Filesize
300.0MB
MD541d8a777ddc40a009a046f88900c0b80
SHA125dfd72ffe79eb5884d27fead86f4886bed638de
SHA256e6844a84f9210b5803147c158c841404331177bf409dab05fecb3b3303d50347
SHA512e75f3bfc85ed1def013474d61d5ee936ce36f499e0e111a7a1264180b7c7cc0b9a35469c35549e14c5efccc105db509aa5935152aab4e028b038e12b126f4514
-
Filesize
300.0MB
MD541d8a777ddc40a009a046f88900c0b80
SHA125dfd72ffe79eb5884d27fead86f4886bed638de
SHA256e6844a84f9210b5803147c158c841404331177bf409dab05fecb3b3303d50347
SHA512e75f3bfc85ed1def013474d61d5ee936ce36f499e0e111a7a1264180b7c7cc0b9a35469c35549e14c5efccc105db509aa5935152aab4e028b038e12b126f4514