Analysis
-
max time kernel
76s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 10:49
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe
Resource
win10v2004-20230915-en
General
-
Target
SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe
-
Size
542KB
-
MD5
cb8d2cb4372947471ba2f6a7bc3a9c35
-
SHA1
bcf8b0c9f36c33902b11c5e3b3942143068f52ce
-
SHA256
4f09e1857f411cee21a8f8b56535dcf67937ec013873c180215c6420856b4e17
-
SHA512
65fe838186ef865cc4229b04df7268aa1c410fafe64d7264fb6489e5158ec0cbc690730451d1e5c1e22d5010c20771419071f5b512052a7b7bd9382e62a01163
-
SSDEEP
1536:NPd/84RBumqgMUAxEUZ45zT8VXJci2ejtP7nRCHlTigBVrFuOL5aZcThsZ:ZuvgMUOEUvVXJV2ejtlyluOLb
Malware Config
Extracted
originbotnet
https://lamba.nitrosoftwares.shop/gate
-
add_startup
false
-
download_folder_name
zeyy4dqc.kds
-
hide_file_startup
false
-
startup_directory_name
efUDQ
-
startup_environment_name
appdata
-
startup_installation_name
efUDQ.exe
-
startup_registry_name
efUDQ
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
Signatures
-
OriginBotnet
OriginBotnet is a remote access trojan written in C#.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1336 set thread context of 5000 1336 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe 98 -
Program crash 1 IoCs
pid pid_target Process procid_target 704 5000 WerFault.exe 98 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2332 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5000 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe 5000 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5000 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1336 wrote to memory of 5000 1336 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe 98 PID 1336 wrote to memory of 5000 1336 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe 98 PID 1336 wrote to memory of 5000 1336 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe 98 PID 1336 wrote to memory of 5000 1336 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe 98 PID 1336 wrote to memory of 5000 1336 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe 98 PID 1336 wrote to memory of 5000 1336 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe 98 PID 1336 wrote to memory of 5000 1336 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe 98 PID 1336 wrote to memory of 5000 1336 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe 98 PID 1336 wrote to memory of 4168 1336 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe 105 PID 1336 wrote to memory of 4168 1336 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe 105 PID 1336 wrote to memory of 4168 1336 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe 105 PID 1336 wrote to memory of 1620 1336 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe 104 PID 1336 wrote to memory of 1620 1336 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe 104 PID 1336 wrote to memory of 1620 1336 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe 104 PID 1336 wrote to memory of 416 1336 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe 99 PID 1336 wrote to memory of 416 1336 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe 99 PID 1336 wrote to memory of 416 1336 SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe 99 PID 1620 wrote to memory of 2332 1620 cmd.exe 100 PID 1620 wrote to memory of 2332 1620 cmd.exe 100 PID 1620 wrote to memory of 2332 1620 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 13643⤵
- Program crash
PID:704
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.23117.32662.exe" "C:\Users\Admin\AppData\Roaming\svchost\svchost.exe"2⤵PID:416
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\svchost\svchost.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1620
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\svchost"2⤵PID:4168
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\svchost\svchost.exe'" /f1⤵
- Creates scheduled task(s)
PID:2332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 5000 -ip 50001⤵PID:3768
-
C:\Users\Admin\AppData\Roaming\svchost\svchost.exeC:\Users\Admin\AppData\Roaming\svchost\svchost.exe1⤵PID:1324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
542KB
MD5cb8d2cb4372947471ba2f6a7bc3a9c35
SHA1bcf8b0c9f36c33902b11c5e3b3942143068f52ce
SHA2564f09e1857f411cee21a8f8b56535dcf67937ec013873c180215c6420856b4e17
SHA51265fe838186ef865cc4229b04df7268aa1c410fafe64d7264fb6489e5158ec0cbc690730451d1e5c1e22d5010c20771419071f5b512052a7b7bd9382e62a01163
-
Filesize
542KB
MD5cb8d2cb4372947471ba2f6a7bc3a9c35
SHA1bcf8b0c9f36c33902b11c5e3b3942143068f52ce
SHA2564f09e1857f411cee21a8f8b56535dcf67937ec013873c180215c6420856b4e17
SHA51265fe838186ef865cc4229b04df7268aa1c410fafe64d7264fb6489e5158ec0cbc690730451d1e5c1e22d5010c20771419071f5b512052a7b7bd9382e62a01163