Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    28-10-2022 22:07

General

  • Target

    fd2ba2eaf8ca32686511d6baa015ba15e628f90f0e14ab544d37ab444c37cbf3.exe

  • Size

    444KB

  • MD5

    8beaefc95e59a295bf8e008fa9e475ec

  • SHA1

    d6f27c4da7247eb3228e300e3eb41bb6564c9aa0

  • SHA256

    fd2ba2eaf8ca32686511d6baa015ba15e628f90f0e14ab544d37ab444c37cbf3

  • SHA512

    05c747ce80927b9ec773bbe7dbc56efda4be547381bafa1b1ba341b396c77f8c4623a4c6dedf1fd86db5ea2c0065889b76b8357e34e6137e18e908db1dbe5279

  • SSDEEP

    6144:0lO/MKY3HouUijCo7kSDpv34sv64crrr9RLMGsL:0lO/NY3JUo77H64gLKL

Malware Config

Signatures

  • BetaBot

    Beta Bot is a Trojan that infects computers and disables Antivirus.

  • Modifies firewall policy service 2 TTPs 4 IoCs
  • Sets file execution options in registry 2 TTPs 4 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 4 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1400
      • C:\Users\Admin\AppData\Local\Temp\fd2ba2eaf8ca32686511d6baa015ba15e628f90f0e14ab544d37ab444c37cbf3.exe
        "C:\Users\Admin\AppData\Local\Temp\fd2ba2eaf8ca32686511d6baa015ba15e628f90f0e14ab544d37ab444c37cbf3.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2028
        • C:\Users\Admin\AppData\Local\Temp\fd2ba2eaf8ca32686511d6baa015ba15e628f90f0e14ab544d37ab444c37cbf3.exe
          "C:\Users\Admin\AppData\Local\Temp\fd2ba2eaf8ca32686511d6baa015ba15e628f90f0e14ab544d37ab444c37cbf3.exe"
          3⤵
          • Sets file execution options in registry
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Checks processor information in registry
          • Suspicious behavior: MapViewOfSection
          • Suspicious behavior: RenamesItself
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2012
          • C:\Windows\SysWOW64\explorer.exe
            C:\Windows\SysWOW64\explorer.exe
            4⤵
            • Modifies firewall policy service
            • Sets file execution options in registry
            • Checks BIOS information in registry
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Checks processor information in registry
            • Enumerates system info in registry
            • Modifies Internet Explorer Protected Mode
            • Modifies Internet Explorer Protected Mode Banner
            • Modifies Internet Explorer settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:296
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1340

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      2
      T1060

      Defense Evasion

      Modify Registry

      6
      T1112

      Discovery

      Query Registry

      3
      T1012

      System Information Discovery

      4
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/296-69-0x0000000000000000-mapping.dmp
      • memory/296-77-0x00000000003A0000-0x0000000000478000-memory.dmp
        Filesize

        864KB

      • memory/296-76-0x0000000077840000-0x00000000779C0000-memory.dmp
        Filesize

        1.5MB

      • memory/296-75-0x0000000000610000-0x000000000061C000-memory.dmp
        Filesize

        48KB

      • memory/296-74-0x00000000003A0000-0x0000000000478000-memory.dmp
        Filesize

        864KB

      • memory/296-73-0x0000000077840000-0x00000000779C0000-memory.dmp
        Filesize

        1.5MB

      • memory/296-71-0x0000000074D71000-0x0000000074D73000-memory.dmp
        Filesize

        8KB

      • memory/1400-78-0x00000000026E0000-0x00000000026E6000-memory.dmp
        Filesize

        24KB

      • memory/2012-67-0x0000000000240000-0x000000000024D000-memory.dmp
        Filesize

        52KB

      • memory/2012-68-0x0000000000800000-0x000000000080C000-memory.dmp
        Filesize

        48KB

      • memory/2012-66-0x00000000001C0000-0x0000000000225000-memory.dmp
        Filesize

        404KB

      • memory/2012-72-0x00000000001C0000-0x0000000000225000-memory.dmp
        Filesize

        404KB

      • memory/2012-65-0x0000000000400000-0x0000000000434000-memory.dmp
        Filesize

        208KB

      • memory/2012-63-0x00000000001C0000-0x0000000000225000-memory.dmp
        Filesize

        404KB

      • memory/2012-62-0x0000000000400000-0x0000000000434000-memory.dmp
        Filesize

        208KB

      • memory/2012-60-0x0000000000400000-0x0000000000434000-memory.dmp
        Filesize

        208KB

      • memory/2012-58-0x00000000004015C6-mapping.dmp
      • memory/2012-57-0x0000000000400000-0x0000000000434000-memory.dmp
        Filesize

        208KB

      • memory/2028-56-0x00000000759F1000-0x00000000759F3000-memory.dmp
        Filesize

        8KB