Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29-09-2022 10:25

General

  • Target

    7c0096de5c0980d402291ce8d29de4a5.exe

  • Size

    4.4MB

  • MD5

    7c0096de5c0980d402291ce8d29de4a5

  • SHA1

    a7dc912b7d74e300a2a3985a9b910031bc86c31d

  • SHA256

    5e1ea26f5575e26857b209695de82207a04de0b0dc06f3645f776cc628440c46

  • SHA512

    f4ca6efe60f745a61ab0e318e75c69d149b08ab9765ae2a8f7b2c2cfe7f43a5cac989cc150968df0da9732d2ce3eb7261f4b2a5ceb4678501d4069e22bd6f7f6

  • SSDEEP

    98304:1p/pzzUR6L0skzfu28Lm2QN3SJX7zojSHxWcfSAsJCTRmYrX:Pxfi6+DujLm2hJ78jSkTcTAYr

Score
10/10

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

103.125.190.185:1234

Attributes
  • communication_password

    827ccb0eea8a706c4c34a16891f84e7b

  • tor_process

    tor

Signatures

  • BitRAT

    BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c0096de5c0980d402291ce8d29de4a5.exe
    "C:\Users\Admin\AppData\Local\Temp\7c0096de5c0980d402291ce8d29de4a5.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Users\Admin\AppData\Local\Temp\7c0096de5c0980d402291ce8d29de4a5.exe
      "C:\Users\Admin\AppData\Local\Temp\7c0096de5c0980d402291ce8d29de4a5.exe"
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1688

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1688-75-0x0000000000400000-0x00000000007CE000-memory.dmp
    Filesize

    3.8MB

  • memory/1688-77-0x0000000000400000-0x00000000007CE000-memory.dmp
    Filesize

    3.8MB

  • memory/1688-69-0x0000000000400000-0x00000000007CE000-memory.dmp
    Filesize

    3.8MB

  • memory/1688-67-0x0000000000400000-0x00000000007CE000-memory.dmp
    Filesize

    3.8MB

  • memory/1688-81-0x0000000000100000-0x000000000010A000-memory.dmp
    Filesize

    40KB

  • memory/1688-80-0x0000000000400000-0x00000000007CE000-memory.dmp
    Filesize

    3.8MB

  • memory/1688-60-0x0000000000400000-0x00000000007CE000-memory.dmp
    Filesize

    3.8MB

  • memory/1688-61-0x0000000000400000-0x00000000007CE000-memory.dmp
    Filesize

    3.8MB

  • memory/1688-70-0x0000000000400000-0x00000000007CE000-memory.dmp
    Filesize

    3.8MB

  • memory/1688-65-0x0000000000400000-0x00000000007CE000-memory.dmp
    Filesize

    3.8MB

  • memory/1688-82-0x0000000000100000-0x000000000010A000-memory.dmp
    Filesize

    40KB

  • memory/1688-79-0x0000000000100000-0x000000000010A000-memory.dmp
    Filesize

    40KB

  • memory/1688-63-0x0000000000400000-0x00000000007CE000-memory.dmp
    Filesize

    3.8MB

  • memory/1688-72-0x0000000000400000-0x00000000007CE000-memory.dmp
    Filesize

    3.8MB

  • memory/1688-73-0x000000000068A488-mapping.dmp
  • memory/1688-78-0x0000000000100000-0x000000000010A000-memory.dmp
    Filesize

    40KB

  • memory/1996-55-0x0000000075521000-0x0000000075523000-memory.dmp
    Filesize

    8KB

  • memory/1996-54-0x00000000009E0000-0x0000000000E58000-memory.dmp
    Filesize

    4.5MB

  • memory/1996-56-0x0000000000500000-0x0000000000514000-memory.dmp
    Filesize

    80KB

  • memory/1996-59-0x000000000B610000-0x000000000BA1A000-memory.dmp
    Filesize

    4.0MB

  • memory/1996-58-0x0000000009DC0000-0x000000000A1E0000-memory.dmp
    Filesize

    4.1MB

  • memory/1996-57-0x0000000000590000-0x000000000059C000-memory.dmp
    Filesize

    48KB