Analysis

  • max time kernel
    205s
  • max time network
    212s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2022 18:59

General

  • Target

    7e319c1315d5b97983fb7cb4d93ddf0c.exe

  • Size

    65KB

  • MD5

    7e319c1315d5b97983fb7cb4d93ddf0c

  • SHA1

    fde2d21cb08b8d95ea2e4419e51aa43f8da348ac

  • SHA256

    311dc36ff1b1c092fe3c27ea3d7c699b77d092da4d5f1ccb5fc8e35b9a4adf5c

  • SHA512

    02f59f8d2dd41e1e287c46a8bd3119c98d2f2500a95a7d980791f7f6f326cad43111385b30d3c8e6de912905a81527632dd9a7089f1aa6f1716eabe4608bcfad

  • SSDEEP

    1536:WIHebrEKfgYBUngABZvxZ/DOG8s8MkeNSzXzK1:Gb4KRapBZP/Dl8DMDSzX+1

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

37.139.128.233:3569

Attributes
  • communication_password

    ce952068942604a6d6df06ed5002fad6

  • tor_process

    tor

Signatures

  • BitRAT

    BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e319c1315d5b97983fb7cb4d93ddf0c.exe
    "C:\Users\Admin\AppData\Local\Temp\7e319c1315d5b97983fb7cb4d93ddf0c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:624
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell" Get-Date
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1348
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA1AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:756
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      2⤵
        PID:632
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        2⤵
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1912

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

      Filesize

      7KB

      MD5

      f2f2c39711591c92f4cd87423bc69efe

      SHA1

      875cad7003659f79feca7e8f767f49854ac1d822

      SHA256

      841009e72115d50c7884f7b4363ac01b11878ed7ef16b8f8c13393fd937b1fd2

      SHA512

      4ae7558d24df410d7fe0e25f1a92d28519aac0aa93ccdbba9d2b38cd78869036cc25207ebeb716a6a8b4eacb9e79e5c10ea46b20c271b69ea5edf8a2bf709b44

    • memory/624-54-0x0000000000E20000-0x0000000000E36000-memory.dmp

      Filesize

      88KB

    • memory/624-61-0x00000000074E0000-0x00000000078BC000-memory.dmp

      Filesize

      3.9MB

    • memory/756-62-0x0000000000000000-mapping.dmp

    • memory/756-65-0x000000006EC60000-0x000000006F20B000-memory.dmp

      Filesize

      5.7MB

    • memory/756-66-0x000000006EC60000-0x000000006F20B000-memory.dmp

      Filesize

      5.7MB

    • memory/756-67-0x000000006EC60000-0x000000006F20B000-memory.dmp

      Filesize

      5.7MB

    • memory/1348-55-0x0000000000000000-mapping.dmp

    • memory/1348-56-0x00000000766F1000-0x00000000766F3000-memory.dmp

      Filesize

      8KB

    • memory/1348-58-0x0000000070040000-0x00000000705EB000-memory.dmp

      Filesize

      5.7MB

    • memory/1348-59-0x0000000070040000-0x00000000705EB000-memory.dmp

      Filesize

      5.7MB

    • memory/1348-60-0x0000000070040000-0x00000000705EB000-memory.dmp

      Filesize

      5.7MB

    • memory/1912-71-0x0000000000400000-0x00000000007CE000-memory.dmp

      Filesize

      3.8MB

    • memory/1912-80-0x0000000000400000-0x00000000007CE000-memory.dmp

      Filesize

      3.8MB

    • memory/1912-68-0x0000000000400000-0x00000000007CE000-memory.dmp

      Filesize

      3.8MB

    • memory/1912-73-0x0000000000400000-0x00000000007CE000-memory.dmp

      Filesize

      3.8MB

    • memory/1912-75-0x0000000000400000-0x00000000007CE000-memory.dmp

      Filesize

      3.8MB

    • memory/1912-77-0x0000000000400000-0x00000000007CE000-memory.dmp

      Filesize

      3.8MB

    • memory/1912-78-0x0000000000400000-0x00000000007CE000-memory.dmp

      Filesize

      3.8MB

    • memory/1912-69-0x0000000000400000-0x00000000007CE000-memory.dmp

      Filesize

      3.8MB

    • memory/1912-81-0x000000000068A488-mapping.dmp

    • memory/1912-83-0x0000000000400000-0x00000000007CE000-memory.dmp

      Filesize

      3.8MB

    • memory/1912-85-0x0000000000400000-0x00000000007CE000-memory.dmp

      Filesize

      3.8MB

    • memory/1912-86-0x0000000000110000-0x000000000011A000-memory.dmp

      Filesize

      40KB

    • memory/1912-87-0x0000000000110000-0x000000000011A000-memory.dmp

      Filesize

      40KB

    • memory/1912-88-0x0000000000400000-0x00000000007CE000-memory.dmp

      Filesize

      3.8MB

    • memory/1912-89-0x0000000000110000-0x000000000011A000-memory.dmp

      Filesize

      40KB

    • memory/1912-90-0x0000000000110000-0x000000000011A000-memory.dmp

      Filesize

      40KB