Analysis

  • max time kernel
    190s
  • max time network
    234s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-11-2022 19:01

General

  • Target

    9a0a5ca2046e116e4e4c4c3afabfa11be5931f85b18df2732a26be06bf418f0f.exe

  • Size

    6.2MB

  • MD5

    188ea6da222629732fd7ec7e22f7cd3b

  • SHA1

    1e9d81e4b41ca5fb4eb4cbb442c183fd4783c6ec

  • SHA256

    9a0a5ca2046e116e4e4c4c3afabfa11be5931f85b18df2732a26be06bf418f0f

  • SHA512

    4634a0e87524d14f3204f5d585d26225258762cc4bc57d043e0bf4fc8f57a6b623649a03690956626b721f04aa8f191bc158d3572c1688d2c28152c790d57ace

  • SSDEEP

    98304:xmBa4AnQ0WOpalZxd/9hMuP8WMLmuZKVSr6ZlDs6XnUbJp5KysMS04ESFtvbcI6T:x0oQ0WOpCZBxPukVSGqX5KyJ4ESjcIg

Malware Config

Extracted

Family

bitrat

Version

1.34

C2

2.56.212.226:1995

Attributes
  • communication_password

    a76d949640a165da25ccfe9a8fd82c8a

  • install_dir

    DiagnosticPerfos

  • install_file

    DiagnosticPerformer.exe

  • tor_process

    tor

Signatures

  • BitRAT

    BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9a0a5ca2046e116e4e4c4c3afabfa11be5931f85b18df2732a26be06bf418f0f.exe
    "C:\Users\Admin\AppData\Local\Temp\9a0a5ca2046e116e4e4c4c3afabfa11be5931f85b18df2732a26be06bf418f0f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1468

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1468-132-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-135-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-136-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-137-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-138-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-139-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-140-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-141-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-142-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-143-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-144-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-145-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-146-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-147-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-148-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-149-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-150-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-152-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-153-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-154-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-155-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-156-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-157-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-158-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-159-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-160-0x0000000074B30000-0x0000000074B69000-memory.dmp

    Filesize

    228KB

  • memory/1468-161-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-162-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-163-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-164-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-165-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-166-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-167-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-168-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-169-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-170-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-171-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-172-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-173-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-174-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-175-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-176-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-177-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-178-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-179-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-180-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-181-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-183-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-184-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-185-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-186-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-187-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-188-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-189-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-190-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-191-0x00000000747F0000-0x0000000074829000-memory.dmp

    Filesize

    228KB

  • memory/1468-192-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB

  • memory/1468-193-0x0000000000400000-0x00000000010AA000-memory.dmp

    Filesize

    12.7MB