Analysis

  • max time kernel
    195s
  • max time network
    206s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 10:03

General

  • Target

    15478642d48681a67374167d173d4f84.exe

  • Size

    4.9MB

  • MD5

    15478642d48681a67374167d173d4f84

  • SHA1

    9790217e8b9a2134f2abf451ac68c847dc31c905

  • SHA256

    4e1c013bf36b27f78e0fdc7ab5a67bc3f62f33c97f5848daf40df7ec7d842fa4

  • SHA512

    4b8c58f0605c562bddddabff542b76a06a65206c90c3bf430752785287fc88afc2a38c7780e1d94650735ec9a0f45ad8d9540e10fd0300734626c867d0ee5819

  • SSDEEP

    98304:6jT71ntlY5xzFunCcZ2iH9oFfQPjpw6D8cKuEBQ5Qbg+db778Fm/S3DdK1NPgf6K:i3fCcZZ2VQtbXQ9A5DdK1NPgCWXaYRX7

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

185.215.113.102:1234

Attributes
  • communication_password

    5d55208d3d81a0bf50741250fe5b93d7

  • install_dir

    GuiterX

  • install_file

    GuiterX.exe

  • tor_process

    tor

Signatures

  • BitRAT

    BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious behavior: RenamesItself 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15478642d48681a67374167d173d4f84.exe
    "C:\Users\Admin\AppData\Local\Temp\15478642d48681a67374167d173d4f84.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:3532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3532-0-0x0000000000400000-0x00000000008EE000-memory.dmp

    Filesize

    4.9MB

  • memory/3532-1-0x0000000000400000-0x00000000008EE000-memory.dmp

    Filesize

    4.9MB

  • memory/3532-2-0x0000000000EE0000-0x0000000000EE1000-memory.dmp

    Filesize

    4KB

  • memory/3532-3-0x0000000003010000-0x00000000033DE000-memory.dmp

    Filesize

    3.8MB

  • memory/3532-4-0x0000000003010000-0x00000000033DE000-memory.dmp

    Filesize

    3.8MB

  • memory/3532-5-0x00000000740A0000-0x00000000740D9000-memory.dmp

    Filesize

    228KB

  • memory/3532-6-0x0000000000EE0000-0x0000000000EE1000-memory.dmp

    Filesize

    4KB

  • memory/3532-7-0x0000000003010000-0x00000000033DE000-memory.dmp

    Filesize

    3.8MB

  • memory/3532-9-0x0000000003010000-0x00000000033DE000-memory.dmp

    Filesize

    3.8MB

  • memory/3532-10-0x0000000003010000-0x00000000033DE000-memory.dmp

    Filesize

    3.8MB

  • memory/3532-11-0x0000000003010000-0x00000000033DE000-memory.dmp

    Filesize

    3.8MB

  • memory/3532-13-0x0000000003010000-0x00000000033DE000-memory.dmp

    Filesize

    3.8MB

  • memory/3532-12-0x0000000003010000-0x00000000033DE000-memory.dmp

    Filesize

    3.8MB

  • memory/3532-14-0x0000000003010000-0x00000000033DE000-memory.dmp

    Filesize

    3.8MB

  • memory/3532-15-0x0000000003010000-0x00000000033DE000-memory.dmp

    Filesize

    3.8MB

  • memory/3532-16-0x0000000073D70000-0x0000000073DA9000-memory.dmp

    Filesize

    228KB

  • memory/3532-17-0x0000000003010000-0x00000000033DE000-memory.dmp

    Filesize

    3.8MB

  • memory/3532-18-0x0000000003010000-0x00000000033DE000-memory.dmp

    Filesize

    3.8MB

  • memory/3532-19-0x0000000073D70000-0x0000000073DA9000-memory.dmp

    Filesize

    228KB

  • memory/3532-20-0x0000000003010000-0x00000000033DE000-memory.dmp

    Filesize

    3.8MB

  • memory/3532-21-0x0000000003010000-0x00000000033DE000-memory.dmp

    Filesize

    3.8MB

  • memory/3532-22-0x0000000073D70000-0x0000000073DA9000-memory.dmp

    Filesize

    228KB