Analysis
-
max time kernel
143s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
05-08-2023 23:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
jbit.exe
Resource
win7-20230712-en
windows7-x64
3 signatures
150 seconds
General
-
Target
jbit.exe
-
Size
81.1MB
-
MD5
8eda3b52a16bb07d5a03441c10296502
-
SHA1
35ac1bafbedf456bf4cca1606673501a5200e623
-
SHA256
23abe80bf01902aca2c57c6494ef60780187a870d01d964790306a10b3fa23ad
-
SHA512
9f9e09c7b1645785d560f6cdd408714a544ef058197731626cf66d8708b43ef35b7116c7b5a15986fb7b11ff3513387db97e06dae42650ab0310ece0c943cac8
-
SSDEEP
1572864:bUSBvWtkRbCHf7RKxFOBS/DllaKg1h6xyPbm2oXMyOwGR2sedKdiizqZ4ujuw5b9:bRBvw4wDqFWS/DDumMP63XVXY2sedKdM
Malware Config
Extracted
Family
bitrat
Version
1.38
C2
backu4734.duckdns.org:7904
Attributes
-
communication_password
202cb962ac59075b964b07152d234b70
-
tor_process
tor
Signatures
-
Drops startup file 1 IoCs
Processes:
jbit.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Skktdrerof.vbs jbit.exe -
Processes:
resource yara_rule behavioral2/memory/3044-1226-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3044-1240-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
RegAsm.exepid process 3044 RegAsm.exe 3044 RegAsm.exe 3044 RegAsm.exe 3044 RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
jbit.exedescription pid process target process PID 3968 set thread context of 3044 3968 jbit.exe RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jbit.exeRegAsm.exedescription pid process Token: SeDebugPrivilege 3968 jbit.exe Token: SeShutdownPrivilege 3044 RegAsm.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
RegAsm.exepid process 3044 RegAsm.exe 3044 RegAsm.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
jbit.exedescription pid process target process PID 3968 wrote to memory of 3044 3968 jbit.exe RegAsm.exe PID 3968 wrote to memory of 3044 3968 jbit.exe RegAsm.exe PID 3968 wrote to memory of 3044 3968 jbit.exe RegAsm.exe PID 3968 wrote to memory of 3044 3968 jbit.exe RegAsm.exe PID 3968 wrote to memory of 3044 3968 jbit.exe RegAsm.exe PID 3968 wrote to memory of 3044 3968 jbit.exe RegAsm.exe PID 3968 wrote to memory of 3044 3968 jbit.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\jbit.exe"C:\Users\Admin\AppData\Local\Temp\jbit.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3044