Analysis

  • max time kernel
    145s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 23:40

General

  • Target

    bit_che_install.exe

  • Size

    787KB

  • MD5

    1b06e4f31743ce64a4db12c3a71ae098

  • SHA1

    0c72561f6776f83aef89bb1c8b89f6464d4435b2

  • SHA256

    50916cbaf2449a17b7989b978656882f977a52df7e8417989a0bfd31be81103b

  • SHA512

    73c798c7a6c6ffe0e51d0d0e68aa2c5558b2f146201de43b565da84aa2bed0534ba3a0ea53053942b23163ae46fff52d82efc7995825fb0f3c785de019e95b44

  • SSDEEP

    12288:lXHJGDA7urFN/5OfIP4iiZGJNCjcxn9dNN:9HoDAKrD/c+4nZ6NGcxn9dN

Score
9/10

Malware Config

Signatures

  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bit_che_install.exe
    "C:\Users\Admin\AppData\Local\Temp\bit_che_install.exe"
    1⤵
    • Enumerates VirtualBox registry keys
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1204

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1204-54-0x0000000000400000-0x00000000004CB000-memory.dmp

    Filesize

    812KB

  • memory/1204-56-0x0000000000400000-0x00000000004CB000-memory.dmp

    Filesize

    812KB

  • memory/1204-55-0x0000000000400000-0x00000000004CB000-memory.dmp

    Filesize

    812KB

  • memory/1204-57-0x0000000000400000-0x00000000004CB000-memory.dmp

    Filesize

    812KB

  • memory/1204-59-0x0000000000400000-0x00000000004CB000-memory.dmp

    Filesize

    812KB

  • memory/1204-60-0x0000000000400000-0x00000000004CB000-memory.dmp

    Filesize

    812KB

  • memory/1204-62-0x0000000000400000-0x00000000004CB000-memory.dmp

    Filesize

    812KB

  • memory/1204-61-0x0000000000400000-0x00000000004CB000-memory.dmp

    Filesize

    812KB

  • memory/1204-63-0x0000000000400000-0x00000000004CB000-memory.dmp

    Filesize

    812KB

  • memory/1204-64-0x0000000074DE1000-0x0000000074DE3000-memory.dmp

    Filesize

    8KB

  • memory/1204-65-0x0000000000540000-0x00000000005C7000-memory.dmp

    Filesize

    540KB

  • memory/1204-66-0x0000000000400000-0x00000000004CB000-memory.dmp

    Filesize

    812KB