Analysis
-
max time kernel
123s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-10-2022 18:06
Static task
static1
Behavioral task
behavioral1
Sample
43_85_73_parsed.exe
Resource
win7-20220901-en
General
-
Target
43_85_73_parsed.exe
-
Size
3.0MB
-
MD5
bd22be1e69a4239d389fe343129eb48d
-
SHA1
4bff5aac0df64899f90172ab1af8783881d3d0d9
-
SHA256
ddd8dd0b708e17bc9e76db79925f69b12259ae08b5a1e812a5abc4bdc38e8c3d
-
SHA512
603c8c2986f07c214d6b88ce95fcd34dcb71970adb288db981bb073d774537b34d23dcd80a718d639838d350f39de09fee0459b88fdad3d7fdfbba24a7710899
-
SSDEEP
49152:sOQ2JptNdkDY3CZHqmwDpu2qNd6T4o427WJUf8gZaDTl4i44A1eSAiEHk1VYZPrE:sCTNdfCZKmsqcT4sCi8gZW5iR1bggSZQ
Malware Config
Extracted
bitrat
1.38
bitone9090.duckdns.org:9090
bit9090.duckdns.org:9090
-
communication_password
e10adc3949ba59abbe56e057f20f883e
-
tor_process
tor
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
nbittt9090.exehygt.exepid process 4028 nbittt9090.exe 4236 hygt.exe -
Processes:
resource yara_rule behavioral2/memory/5112-138-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/5112-139-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/5112-140-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/5112-141-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/5112-142-0x0000000000400000-0x00000000007E4000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\nbittt9090.exe upx C:\Users\Admin\AppData\Local\Temp\nbittt9090.exe upx behavioral2/memory/4028-146-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/5112-150-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4028-151-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/1776-162-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/1776-163-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
43_85_73_parsed.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 43_85_73_parsed.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
Processes:
vbc.exenbittt9090.exevbc.exepid process 5112 vbc.exe 5112 vbc.exe 5112 vbc.exe 5112 vbc.exe 5112 vbc.exe 4028 nbittt9090.exe 4028 nbittt9090.exe 4028 nbittt9090.exe 4028 nbittt9090.exe 4028 nbittt9090.exe 1776 vbc.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
43_85_73_parsed.exehygt.exedescription pid process target process PID 1744 set thread context of 5112 1744 43_85_73_parsed.exe vbc.exe PID 4236 set thread context of 1776 4236 hygt.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2100 schtasks.exe 4896 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vbc.exenbittt9090.exevbc.exedescription pid process Token: SeShutdownPrivilege 5112 vbc.exe Token: SeShutdownPrivilege 4028 nbittt9090.exe Token: SeShutdownPrivilege 1776 vbc.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
vbc.exenbittt9090.exepid process 5112 vbc.exe 5112 vbc.exe 4028 nbittt9090.exe 4028 nbittt9090.exe -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
43_85_73_parsed.execmd.exehygt.execmd.exedescription pid process target process PID 1744 wrote to memory of 4508 1744 43_85_73_parsed.exe cmd.exe PID 1744 wrote to memory of 4508 1744 43_85_73_parsed.exe cmd.exe PID 1744 wrote to memory of 4508 1744 43_85_73_parsed.exe cmd.exe PID 4508 wrote to memory of 2100 4508 cmd.exe schtasks.exe PID 4508 wrote to memory of 2100 4508 cmd.exe schtasks.exe PID 4508 wrote to memory of 2100 4508 cmd.exe schtasks.exe PID 1744 wrote to memory of 4864 1744 43_85_73_parsed.exe cmd.exe PID 1744 wrote to memory of 4864 1744 43_85_73_parsed.exe cmd.exe PID 1744 wrote to memory of 4864 1744 43_85_73_parsed.exe cmd.exe PID 1744 wrote to memory of 5112 1744 43_85_73_parsed.exe vbc.exe PID 1744 wrote to memory of 5112 1744 43_85_73_parsed.exe vbc.exe PID 1744 wrote to memory of 5112 1744 43_85_73_parsed.exe vbc.exe PID 1744 wrote to memory of 5112 1744 43_85_73_parsed.exe vbc.exe PID 1744 wrote to memory of 5112 1744 43_85_73_parsed.exe vbc.exe PID 1744 wrote to memory of 5112 1744 43_85_73_parsed.exe vbc.exe PID 1744 wrote to memory of 5112 1744 43_85_73_parsed.exe vbc.exe PID 1744 wrote to memory of 4028 1744 43_85_73_parsed.exe nbittt9090.exe PID 1744 wrote to memory of 4028 1744 43_85_73_parsed.exe nbittt9090.exe PID 1744 wrote to memory of 4028 1744 43_85_73_parsed.exe nbittt9090.exe PID 4236 wrote to memory of 4308 4236 hygt.exe cmd.exe PID 4236 wrote to memory of 4308 4236 hygt.exe cmd.exe PID 4236 wrote to memory of 4308 4236 hygt.exe cmd.exe PID 4308 wrote to memory of 4896 4308 cmd.exe schtasks.exe PID 4308 wrote to memory of 4896 4308 cmd.exe schtasks.exe PID 4308 wrote to memory of 4896 4308 cmd.exe schtasks.exe PID 4236 wrote to memory of 1208 4236 hygt.exe cmd.exe PID 4236 wrote to memory of 1208 4236 hygt.exe cmd.exe PID 4236 wrote to memory of 1208 4236 hygt.exe cmd.exe PID 4236 wrote to memory of 1776 4236 hygt.exe vbc.exe PID 4236 wrote to memory of 1776 4236 hygt.exe vbc.exe PID 4236 wrote to memory of 1776 4236 hygt.exe vbc.exe PID 4236 wrote to memory of 1776 4236 hygt.exe vbc.exe PID 4236 wrote to memory of 1776 4236 hygt.exe vbc.exe PID 4236 wrote to memory of 1776 4236 hygt.exe vbc.exe PID 4236 wrote to memory of 1776 4236 hygt.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\43_85_73_parsed.exe"C:\Users\Admin\AppData\Local\Temp\43_85_73_parsed.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\hygt.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\hygt.exe'" /f3⤵
- Creates scheduled task(s)
PID:2100 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\43_85_73_parsed.exe" "C:\Users\Admin\AppData\Roaming\hygt.exe"2⤵PID:4864
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\nbittt9090.exe"C:\Users\Admin\AppData\Local\Temp\nbittt9090.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4028
-
C:\Users\Admin\AppData\Roaming\hygt.exeC:\Users\Admin\AppData\Roaming\hygt.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\hygt.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\hygt.exe'" /f3⤵
- Creates scheduled task(s)
PID:4896 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\hygt.exe" "C:\Users\Admin\AppData\Roaming\hygt.exe"2⤵PID:1208
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1776
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5d2d601c4f27a42233076ebc6e05f07f0
SHA15a0b561f883b88ca3d4d9bdba5143f103ea83d14
SHA256dc9fcc38f0fad625bdd15fa418178cbcd8783e8c66bccf1bd300ead64c9e05eb
SHA512f28db947332f2151de3a7b24101788afaeb3a00a63221dd20b745bd4ffe1ca495c6a4ac148ff8925635b720ae7c8bc586ab697622097a78a0e2588aa9d70b077
-
Filesize
1.4MB
MD5d2d601c4f27a42233076ebc6e05f07f0
SHA15a0b561f883b88ca3d4d9bdba5143f103ea83d14
SHA256dc9fcc38f0fad625bdd15fa418178cbcd8783e8c66bccf1bd300ead64c9e05eb
SHA512f28db947332f2151de3a7b24101788afaeb3a00a63221dd20b745bd4ffe1ca495c6a4ac148ff8925635b720ae7c8bc586ab697622097a78a0e2588aa9d70b077
-
Filesize
3.0MB
MD5bd22be1e69a4239d389fe343129eb48d
SHA14bff5aac0df64899f90172ab1af8783881d3d0d9
SHA256ddd8dd0b708e17bc9e76db79925f69b12259ae08b5a1e812a5abc4bdc38e8c3d
SHA512603c8c2986f07c214d6b88ce95fcd34dcb71970adb288db981bb073d774537b34d23dcd80a718d639838d350f39de09fee0459b88fdad3d7fdfbba24a7710899
-
Filesize
3.0MB
MD5bd22be1e69a4239d389fe343129eb48d
SHA14bff5aac0df64899f90172ab1af8783881d3d0d9
SHA256ddd8dd0b708e17bc9e76db79925f69b12259ae08b5a1e812a5abc4bdc38e8c3d
SHA512603c8c2986f07c214d6b88ce95fcd34dcb71970adb288db981bb073d774537b34d23dcd80a718d639838d350f39de09fee0459b88fdad3d7fdfbba24a7710899