Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20-03-2024 06:47
Static task
static1
Behavioral task
behavioral1
Sample
d825fa02ed9b209b329dfd2eb8bfc29a.exe
Resource
win7-20240221-en
General
-
Target
d825fa02ed9b209b329dfd2eb8bfc29a.exe
-
Size
3.5MB
-
MD5
d825fa02ed9b209b329dfd2eb8bfc29a
-
SHA1
a504da00ac20b1b5c7e8a375e18ebd210fb3d3f5
-
SHA256
2b590ae0dbb1cfe013c780beaad0401d7fc483c9d5f453cf23b79faa7adfd67f
-
SHA512
9008ee92c62d2c81efc89bfca9c606083dd39aedc9057062c194d9a5f0aa566010f5fa8c369fb4e4f69275466acbc571159933efd45f89d52bc58182ece94fbc
-
SSDEEP
49152:vLVwb6UKSZrEW33E+pNfwJEqNsAjYQcXaD+2GVxo85odrpxeyprdY8Q1ZLKx:vLxQF6TjhGVaTBmh
Malware Config
Extracted
bitrat
1.30
Signatures
-
BitRAT payload 16 IoCs
resource yara_rule behavioral2/memory/60-19-0x0000000000400000-0x000000000079E000-memory.dmp family_bitrat behavioral2/memory/60-21-0x0000000000400000-0x000000000079E000-memory.dmp family_bitrat behavioral2/memory/60-23-0x0000000000400000-0x000000000079E000-memory.dmp family_bitrat behavioral2/memory/60-25-0x0000000000400000-0x000000000079E000-memory.dmp family_bitrat behavioral2/memory/60-27-0x0000000000400000-0x000000000079E000-memory.dmp family_bitrat behavioral2/memory/60-28-0x0000000000400000-0x000000000079E000-memory.dmp family_bitrat behavioral2/memory/60-29-0x0000000000400000-0x000000000079E000-memory.dmp family_bitrat behavioral2/memory/60-30-0x0000000000400000-0x000000000079E000-memory.dmp family_bitrat behavioral2/memory/60-31-0x0000000000400000-0x000000000079E000-memory.dmp family_bitrat behavioral2/memory/60-32-0x0000000000400000-0x000000000079E000-memory.dmp family_bitrat behavioral2/memory/60-33-0x0000000000400000-0x000000000079E000-memory.dmp family_bitrat behavioral2/memory/60-35-0x0000000000400000-0x000000000079E000-memory.dmp family_bitrat behavioral2/memory/60-36-0x0000000000400000-0x000000000079E000-memory.dmp family_bitrat behavioral2/memory/60-37-0x0000000000400000-0x000000000079E000-memory.dmp family_bitrat behavioral2/memory/60-39-0x0000000000400000-0x000000000079E000-memory.dmp family_bitrat behavioral2/memory/60-40-0x0000000000400000-0x000000000079E000-memory.dmp family_bitrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation d825fa02ed9b209b329dfd2eb8bfc29a.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 60 d825fa02ed9b209b329dfd2eb8bfc29a.exe 60 d825fa02ed9b209b329dfd2eb8bfc29a.exe 60 d825fa02ed9b209b329dfd2eb8bfc29a.exe 60 d825fa02ed9b209b329dfd2eb8bfc29a.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3208 set thread context of 60 3208 d825fa02ed9b209b329dfd2eb8bfc29a.exe 104 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2720 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 60 d825fa02ed9b209b329dfd2eb8bfc29a.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 60 d825fa02ed9b209b329dfd2eb8bfc29a.exe 60 d825fa02ed9b209b329dfd2eb8bfc29a.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3208 wrote to memory of 2720 3208 d825fa02ed9b209b329dfd2eb8bfc29a.exe 102 PID 3208 wrote to memory of 2720 3208 d825fa02ed9b209b329dfd2eb8bfc29a.exe 102 PID 3208 wrote to memory of 2720 3208 d825fa02ed9b209b329dfd2eb8bfc29a.exe 102 PID 3208 wrote to memory of 60 3208 d825fa02ed9b209b329dfd2eb8bfc29a.exe 104 PID 3208 wrote to memory of 60 3208 d825fa02ed9b209b329dfd2eb8bfc29a.exe 104 PID 3208 wrote to memory of 60 3208 d825fa02ed9b209b329dfd2eb8bfc29a.exe 104 PID 3208 wrote to memory of 60 3208 d825fa02ed9b209b329dfd2eb8bfc29a.exe 104 PID 3208 wrote to memory of 60 3208 d825fa02ed9b209b329dfd2eb8bfc29a.exe 104 PID 3208 wrote to memory of 60 3208 d825fa02ed9b209b329dfd2eb8bfc29a.exe 104 PID 3208 wrote to memory of 60 3208 d825fa02ed9b209b329dfd2eb8bfc29a.exe 104 PID 3208 wrote to memory of 60 3208 d825fa02ed9b209b329dfd2eb8bfc29a.exe 104 PID 3208 wrote to memory of 60 3208 d825fa02ed9b209b329dfd2eb8bfc29a.exe 104 PID 3208 wrote to memory of 60 3208 d825fa02ed9b209b329dfd2eb8bfc29a.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\d825fa02ed9b209b329dfd2eb8bfc29a.exe"C:\Users\Admin\AppData\Local\Temp\d825fa02ed9b209b329dfd2eb8bfc29a.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pNmCBdixl" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC8E.tmp"2⤵
- Creates scheduled task(s)
PID:2720
-
-
C:\Users\Admin\AppData\Local\Temp\d825fa02ed9b209b329dfd2eb8bfc29a.exe"C:\Users\Admin\AppData\Local\Temp\d825fa02ed9b209b329dfd2eb8bfc29a.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:60
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a5e1f2e498eada6e1c657ff72ac87921
SHA10dc39e1750914914fc2e1d609590c66971507839
SHA25667d7bf1af3e92c197c5df9dd02c2c42f82ecd34c1436dc4e689e0a60fb68b133
SHA512b3b1f0f1414aa77308cb36c35753e34087c186dea4ff692c8f5d68ee599779e5dd51e3c02053d0a026a8bbd619cd5d7b60f47b9c495f9e855f974c8a2f85b0f8