Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2023 09:20
Behavioral task
behavioral1
Sample
stub.exe
Resource
win7-20230220-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
stub.exe
Resource
win10v2004-20230220-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
stub.exe
-
Size
3.8MB
-
MD5
d5cad087973fab0104f92810bbf16871
-
SHA1
ced93e48beea62c6e444cdb8ae5ea2fbed72085d
-
SHA256
0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9
-
SHA512
1497f30f44a9adfe1496ccc1dc5befe4736bf32e0862102b5a39ca6caadaa1f35023bc8d33ea88cbafd6962e07a92faa49d3a4c0e9e0e192c7f5829ca63ddd8b
-
SSDEEP
98304:d77Pmq33rE/JDLPWZADUGer7B6iY74M/JmlwXVZ4FB:5+R/eZADUXR
Score
10/10
Malware Config
Extracted
Family
bitrat
Version
1.38
C2
soon-lp.at.ply.gg:17209
Attributes
-
communication_password
33d47f3d76b1b6a91406c01ef0ce5164
-
install_dir
BIRAT
-
install_file
svchost
-
tor_process
Tls_Connect
Signatures
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Local\\BIRAT\\svchost먀" stub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Local\\BIRAT\\svchost" stub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Local\\BIRAT\\svchost\ue800" stub.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4344 stub.exe 4344 stub.exe 4344 stub.exe 4344 stub.exe -
Suspicious behavior: RenamesItself 30 IoCs
pid Process 4344 stub.exe 4344 stub.exe 4344 stub.exe 4344 stub.exe 4344 stub.exe 4344 stub.exe 4344 stub.exe 4344 stub.exe 4344 stub.exe 4344 stub.exe 4344 stub.exe 4344 stub.exe 4344 stub.exe 4344 stub.exe 4344 stub.exe 4344 stub.exe 4344 stub.exe 4344 stub.exe 4344 stub.exe 4344 stub.exe 4344 stub.exe 4344 stub.exe 4344 stub.exe 4344 stub.exe 4344 stub.exe 4344 stub.exe 4344 stub.exe 4344 stub.exe 4344 stub.exe 4344 stub.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 4344 stub.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4344 stub.exe 4344 stub.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\stub.exe"C:\Users\Admin\AppData\Local\Temp\stub.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4344