Analysis
-
max time kernel
142s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
05-08-2023 23:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
jbitrt.exe
Resource
win7-20230712-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
jbitrt.exe
Resource
win10v2004-20230703-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
jbitrt.exe
-
Size
350.0MB
-
MD5
ebc87e9cf7540ad79716397271c11e7e
-
SHA1
e4901173b21c903171ef7d83a92c3609ec434fd6
-
SHA256
3ac3647f6d46ddd5220e483a90d09442b440a01bd66ec95c117ad3d3e018def8
-
SHA512
5dcb19389e90bf69047e94b616f843983e3852df0a59eabbdb2d682265dd4ad16b36f60b8b15d8d611824ce25faef4ef8029bc402ec6b87dc4d911db30d800cc
-
SSDEEP
24576:vH9nvaEW1gTI9khgN36kdSG4nGQ5mYeA+igGNTH1YaA0TvD3H1Aza8LN1LV:f9xW1gTI9G0lS7t5mY2ig+yaDvD3CZ
Score
7/10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/396-139-0x0000000000A00000-0x0000000000DE4000-memory.dmp upx behavioral2/memory/396-141-0x0000000000A00000-0x0000000000DE4000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
Processes:
jbitrt.exedescription pid process target process PID 3628 set thread context of 396 3628 jbitrt.exe RegAsm.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2704 396 WerFault.exe RegAsm.exe 1656 396 WerFault.exe RegAsm.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
jbitrt.execmd.exedescription pid process target process PID 3628 wrote to memory of 396 3628 jbitrt.exe RegAsm.exe PID 3628 wrote to memory of 396 3628 jbitrt.exe RegAsm.exe PID 3628 wrote to memory of 396 3628 jbitrt.exe RegAsm.exe PID 3628 wrote to memory of 396 3628 jbitrt.exe RegAsm.exe PID 3628 wrote to memory of 396 3628 jbitrt.exe RegAsm.exe PID 3628 wrote to memory of 396 3628 jbitrt.exe RegAsm.exe PID 3628 wrote to memory of 396 3628 jbitrt.exe RegAsm.exe PID 3628 wrote to memory of 3476 3628 jbitrt.exe cmd.exe PID 3628 wrote to memory of 3476 3628 jbitrt.exe cmd.exe PID 3628 wrote to memory of 3476 3628 jbitrt.exe cmd.exe PID 3628 wrote to memory of 756 3628 jbitrt.exe cmd.exe PID 3628 wrote to memory of 756 3628 jbitrt.exe cmd.exe PID 3628 wrote to memory of 756 3628 jbitrt.exe cmd.exe PID 3628 wrote to memory of 3560 3628 jbitrt.exe cmd.exe PID 3628 wrote to memory of 3560 3628 jbitrt.exe cmd.exe PID 3628 wrote to memory of 3560 3628 jbitrt.exe cmd.exe PID 756 wrote to memory of 4508 756 cmd.exe schtasks.exe PID 756 wrote to memory of 4508 756 cmd.exe schtasks.exe PID 756 wrote to memory of 4508 756 cmd.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\jbitrt.exe"C:\Users\Admin\AppData\Local\Temp\jbitrt.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 396 -s 5363⤵
- Program crash
PID:2704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 396 -s 5403⤵
- Program crash
PID:1656 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Local\Temp\kbitt"2⤵PID:3476
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\jbitrt.exe" "C:\Users\Admin\AppData\Local\Temp\kbitt\kbitt.exe"2⤵PID:3560
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 10 /tn "Nano" /tr "'C:\Users\Admin\AppData\Local\Temp\kbitt\kbitt.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 10 /tn "Nano" /tr "'C:\Users\Admin\AppData\Local\Temp\kbitt\kbitt.exe'" /f3⤵
- Creates scheduled task(s)
PID:4508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 396 -ip 3961⤵PID:3504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 396 -ip 3961⤵PID:1336