Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2023 03:04
Behavioral task
behavioral1
Sample
0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe
Resource
win10v2004-20230220-en
General
-
Target
0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe
-
Size
3.8MB
-
MD5
d5cad087973fab0104f92810bbf16871
-
SHA1
ced93e48beea62c6e444cdb8ae5ea2fbed72085d
-
SHA256
0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9
-
SHA512
1497f30f44a9adfe1496ccc1dc5befe4736bf32e0862102b5a39ca6caadaa1f35023bc8d33ea88cbafd6962e07a92faa49d3a4c0e9e0e192c7f5829ca63ddd8b
-
SSDEEP
98304:d77Pmq33rE/JDLPWZADUGer7B6iY74M/JmlwXVZ4FB:5+R/eZADUXR
Malware Config
Extracted
bitrat
1.38
soon-lp.at.ply.gg:17209
-
communication_password
33d47f3d76b1b6a91406c01ef0ce5164
-
install_dir
BIRAT
-
install_file
svchost
-
tor_process
Tls_Connect
Signatures
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Local\\BIRAT\\svchost\ue800" 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Local\\BIRAT\\svchost" 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Local\\BIRAT\\svchostĀ" 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exepid process 4936 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe 4936 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe 4936 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe 4936 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe -
Suspicious behavior: RenamesItself 30 IoCs
Processes:
0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exepid process 4936 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe 4936 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe 4936 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe 4936 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe 4936 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe 4936 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe 4936 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe 4936 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe 4936 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe 4936 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe 4936 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe 4936 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe 4936 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe 4936 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe 4936 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe 4936 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe 4936 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe 4936 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe 4936 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe 4936 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe 4936 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe 4936 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe 4936 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe 4936 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe 4936 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe 4936 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe 4936 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe 4936 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe 4936 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe 4936 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exedescription pid process Token: SeShutdownPrivilege 4936 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exepid process 4936 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe 4936 0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe"C:\Users\Admin\AppData\Local\Temp\0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4936-133-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/4936-134-0x0000000074EA0000-0x0000000074ED9000-memory.dmpFilesize
228KB
-
memory/4936-135-0x0000000074B60000-0x0000000074B99000-memory.dmpFilesize
228KB
-
memory/4936-136-0x0000000074B60000-0x0000000074B99000-memory.dmpFilesize
228KB
-
memory/4936-137-0x0000000074B60000-0x0000000074B99000-memory.dmpFilesize
228KB
-
memory/4936-138-0x0000000074EA0000-0x0000000074ED9000-memory.dmpFilesize
228KB
-
memory/4936-139-0x0000000074B60000-0x0000000074B99000-memory.dmpFilesize
228KB
-
memory/4936-140-0x0000000074B60000-0x0000000074B99000-memory.dmpFilesize
228KB
-
memory/4936-141-0x0000000074B60000-0x0000000074B99000-memory.dmpFilesize
228KB
-
memory/4936-142-0x0000000074B60000-0x0000000074B99000-memory.dmpFilesize
228KB
-
memory/4936-143-0x0000000074B60000-0x0000000074B99000-memory.dmpFilesize
228KB