Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14/03/2023, 10:33
Static task
static1
Behavioral task
behavioral1
Sample
bart.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bart.exe
Resource
win10v2004-20230220-en
General
-
Target
bart.exe
-
Size
776KB
-
MD5
6a39f57725bccd075545b72a5205f6ce
-
SHA1
2e2d88fe68bca68136996441afa1065a423007b1
-
SHA256
02aeec3b3700be483dbe07a20959c39e57b9281680aad00a7683a130bf3a01a2
-
SHA512
7d41a384cfb789b133371fb140c9ea1602119f0e4ad012fa7e0f225052ce56e29b05b14f55d829c69c4e632cc0e869e7b27e22dcc48d63f5d7ad38279fb06ed8
-
SSDEEP
12288:db30Nt8NiLXRb4qJ5QIfDCw4v9QJglmIUeTs0k0XA3ncLHH:db30NWirw50c7H
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 12 1292 msiexec.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Control Panel\International\Geo\Nation bart.exe -
Loads dropped DLL 1 IoCs
pid Process 1292 msiexec.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1968 set thread context of 1196 1968 bart.exe 28 PID 1196 set thread context of 1184 1196 bart.exe 15 PID 1292 set thread context of 1184 1292 msiexec.exe 15 -
description ioc Process Key created \Registry\User\S-1-5-21-3430344531-3702557399-3004411149-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 msiexec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe 1968 bart.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1184 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1196 bart.exe 1196 bart.exe 1196 bart.exe 1292 msiexec.exe 1292 msiexec.exe 1292 msiexec.exe 1292 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1968 bart.exe Token: SeDebugPrivilege 1196 bart.exe Token: SeDebugPrivilege 1292 msiexec.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1968 wrote to memory of 1196 1968 bart.exe 28 PID 1968 wrote to memory of 1196 1968 bart.exe 28 PID 1968 wrote to memory of 1196 1968 bart.exe 28 PID 1968 wrote to memory of 1196 1968 bart.exe 28 PID 1968 wrote to memory of 1196 1968 bart.exe 28 PID 1968 wrote to memory of 1196 1968 bart.exe 28 PID 1968 wrote to memory of 1196 1968 bart.exe 28 PID 1184 wrote to memory of 1292 1184 Explorer.EXE 29 PID 1184 wrote to memory of 1292 1184 Explorer.EXE 29 PID 1184 wrote to memory of 1292 1184 Explorer.EXE 29 PID 1184 wrote to memory of 1292 1184 Explorer.EXE 29 PID 1184 wrote to memory of 1292 1184 Explorer.EXE 29 PID 1184 wrote to memory of 1292 1184 Explorer.EXE 29 PID 1184 wrote to memory of 1292 1184 Explorer.EXE 29 PID 1292 wrote to memory of 1684 1292 msiexec.exe 32 PID 1292 wrote to memory of 1684 1292 msiexec.exe 32 PID 1292 wrote to memory of 1684 1292 msiexec.exe 32 PID 1292 wrote to memory of 1684 1292 msiexec.exe 32 PID 1292 wrote to memory of 1684 1292 msiexec.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\bart.exe"C:\Users\Admin\AppData\Local\Temp\bart.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\bart.exe"C:\Users\Admin\AppData\Local\Temp\bart.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1196
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1684
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
422KB
MD582949903c2fb1a5eda9181b96800a472
SHA1b1796bd0c2e7eaed79d1cd8d5dd90e02d491b43d
SHA25621ebd12c1aa68aa18f4bfdd7ae30d6d321747ee9d91e1d07926d11f2ae84a101
SHA512c12c980a6778a27f0f9f4266dd8432d5d3f12f3c2a8fa7f760381b3b37c662b71d39274c642e121b78542064e6c9cea48217f808b4ab6a087eb15c27fa02e704
-
Filesize
807KB
MD516a1612789dc9063ebea1cb55433b45b
SHA1438fde2939bbb9b5b437f64f21c316c17ce4a7f6
SHA2566deaec2f96c8a1c20698a93ddd468d5447b55ac426dc381eef5d91b19953bb7b
SHA512d727ce8cd793c09a8688accb7a2eb5d8f84cc198b8e9d51c21e2dfb11d850f3ac64a58d07ff7fe9d1a2fdb613567e4790866c08a423176216ff310bf24a5a7e3