Analysis

  • max time kernel
    146s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    13/03/2024, 15:20 UTC

General

  • Target

    c63582cc8c24d69e4bb0829e71f395f3.exe

  • Size

    2.5MB

  • MD5

    c63582cc8c24d69e4bb0829e71f395f3

  • SHA1

    b789bcd4020aa3bd35ad11a2fbe023772b98a648

  • SHA256

    79f721fce9ff531d55a30dca577a8c55790d9a5b88158654e1daee60e4ed014a

  • SHA512

    170c288927099f254a16ad52155e1ebba2067bab3e8b9e771a81b9946ce3c854ff7275b74911ab8e111e32efd667bcd2359aca3effca41d59447fa57df3beaad

  • SSDEEP

    49152:zb30Hlkz8scuXSG6sIr4ulgbRYfbSVfbpQxLK/SejMqzMgJKl:JoBuXL6sIUueFYfb0f1hMqQgUl

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

jairoandresotalvarorend.linkpc.net:9084

Attributes
  • communication_password

    bfdba24ee3d61f0260c4dc1034c3ee43

  • install_dir

    winlogomdefenerec

  • install_file

    winlogomdefenerec.exe

  • tor_process

    tor

Signatures

  • BitRAT

    BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

  • UPX packed file 20 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: RenamesItself 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c63582cc8c24d69e4bb0829e71f395f3.exe
    "C:\Users\Admin\AppData\Local\Temp\c63582cc8c24d69e4bb0829e71f395f3.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Users\Admin\AppData\Local\Temp\c63582cc8c24d69e4bb0829e71f395f3.exe
      "C:\Users\Admin\AppData\Local\Temp\c63582cc8c24d69e4bb0829e71f395f3.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2732

Network

  • flag-us
    DNS
    jairoandresotalvarorend.linkpc.net
    c63582cc8c24d69e4bb0829e71f395f3.exe
    Remote address:
    8.8.8.8:53
    Request
    jairoandresotalvarorend.linkpc.net
    IN A
    Response
    jairoandresotalvarorend.linkpc.net
    IN CNAME
    linkpc.net
    linkpc.net
    IN A
    139.99.66.103
  • 139.99.66.103:9084
    jairoandresotalvarorend.linkpc.net
    c63582cc8c24d69e4bb0829e71f395f3.exe
    152 B
    3
  • 139.99.66.103:9084
    jairoandresotalvarorend.linkpc.net
    c63582cc8c24d69e4bb0829e71f395f3.exe
    152 B
    3
  • 139.99.66.103:9084
    jairoandresotalvarorend.linkpc.net
    c63582cc8c24d69e4bb0829e71f395f3.exe
    152 B
    3
  • 139.99.66.103:9084
    jairoandresotalvarorend.linkpc.net
    c63582cc8c24d69e4bb0829e71f395f3.exe
    104 B
    2
  • 8.8.8.8:53
    jairoandresotalvarorend.linkpc.net
    dns
    c63582cc8c24d69e4bb0829e71f395f3.exe
    80 B
    110 B
    1
    1

    DNS Request

    jairoandresotalvarorend.linkpc.net

    DNS Response

    139.99.66.103

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2732-28-0x0000000000400000-0x00000000007E4000-memory.dmp

    Filesize

    3.9MB

  • memory/2732-21-0x0000000000400000-0x00000000007E4000-memory.dmp

    Filesize

    3.9MB

  • memory/2732-37-0x0000000000400000-0x00000000007E4000-memory.dmp

    Filesize

    3.9MB

  • memory/2732-36-0x0000000000400000-0x00000000007E4000-memory.dmp

    Filesize

    3.9MB

  • memory/2732-35-0x0000000000400000-0x00000000007E4000-memory.dmp

    Filesize

    3.9MB

  • memory/2732-34-0x0000000000400000-0x00000000007E4000-memory.dmp

    Filesize

    3.9MB

  • memory/2732-33-0x0000000000400000-0x00000000007E4000-memory.dmp

    Filesize

    3.9MB

  • memory/2732-32-0x0000000000400000-0x00000000007E4000-memory.dmp

    Filesize

    3.9MB

  • memory/2732-8-0x0000000000400000-0x00000000007E4000-memory.dmp

    Filesize

    3.9MB

  • memory/2732-10-0x0000000000400000-0x00000000007E4000-memory.dmp

    Filesize

    3.9MB

  • memory/2732-12-0x0000000000400000-0x00000000007E4000-memory.dmp

    Filesize

    3.9MB

  • memory/2732-14-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2732-16-0x0000000000400000-0x00000000007E4000-memory.dmp

    Filesize

    3.9MB

  • memory/2732-31-0x0000000000400000-0x00000000007E4000-memory.dmp

    Filesize

    3.9MB

  • memory/2732-30-0x0000000000400000-0x00000000007E4000-memory.dmp

    Filesize

    3.9MB

  • memory/2732-17-0x0000000000400000-0x00000000007E4000-memory.dmp

    Filesize

    3.9MB

  • memory/2732-23-0x0000000000400000-0x00000000007E4000-memory.dmp

    Filesize

    3.9MB

  • memory/2732-22-0x0000000000400000-0x00000000007E4000-memory.dmp

    Filesize

    3.9MB

  • memory/2732-19-0x0000000000400000-0x00000000007E4000-memory.dmp

    Filesize

    3.9MB

  • memory/2732-24-0x0000000000400000-0x00000000007E4000-memory.dmp

    Filesize

    3.9MB

  • memory/2732-26-0x0000000000400000-0x00000000007E4000-memory.dmp

    Filesize

    3.9MB

  • memory/2732-29-0x0000000000400000-0x00000000007E4000-memory.dmp

    Filesize

    3.9MB

  • memory/2932-0-0x0000000000E10000-0x000000000108E000-memory.dmp

    Filesize

    2.5MB

  • memory/2932-1-0x0000000074260000-0x000000007494E000-memory.dmp

    Filesize

    6.9MB

  • memory/2932-18-0x0000000074260000-0x000000007494E000-memory.dmp

    Filesize

    6.9MB

  • memory/2932-7-0x000000000C660000-0x000000000C7D8000-memory.dmp

    Filesize

    1.5MB

  • memory/2932-6-0x00000000070D0000-0x00000000072C0000-memory.dmp

    Filesize

    1.9MB

  • memory/2932-5-0x0000000004F70000-0x0000000004FB0000-memory.dmp

    Filesize

    256KB

  • memory/2932-4-0x0000000074260000-0x000000007494E000-memory.dmp

    Filesize

    6.9MB

  • memory/2932-3-0x0000000000680000-0x000000000069A000-memory.dmp

    Filesize

    104KB

  • memory/2932-2-0x0000000004F70000-0x0000000004FB0000-memory.dmp

    Filesize

    256KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.