Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    07-05-2024 19:38

General

  • Target

    betab.exe

  • Size

    407KB

  • MD5

    0837a200fd5a11fab728f51384eb8cce

  • SHA1

    7133b6733d36d28aa19b9366689845b356f2b9fd

  • SHA256

    2701eb12bc858772f0fbb29b7c18c4780afecba78e778f4363a78fc8b39feb48

  • SHA512

    176903813e8b28327f671ee4429a3ab51899e446c63cc84d182cbb6ebe68a85b61e22a83696b9b01e5cb251e7fcaa58c296b237a965045832568eda9b727a86f

  • SSDEEP

    12288:qAz8w1X6aftpy7rqvDTdV9Jjg0/9N+5Ct:9zlmroh3JgQAe

Malware Config

Signatures

  • BetaBot

    Beta Bot is a Trojan that infects computers and disables Antivirus.

  • Modifies firewall policy service 2 TTPs 4 IoCs
  • Sets file execution options in registry 2 TTPs 4 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 4 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 30 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Windows\system32\Dwm.exe
    "C:\Windows\system32\Dwm.exe"
    1⤵
      PID:1164
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
      • Adds Run key to start application
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:1228
      • C:\Users\Admin\AppData\Local\Temp\betab.exe
        "C:\Users\Admin\AppData\Local\Temp\betab.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1740
        • C:\Users\Admin\AppData\Roaming\2.exe
          "C:\Users\Admin\AppData\Roaming\2.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of UnmapMainImage
          • Suspicious use of WriteProcessMemory
          PID:268
        • C:\Users\Admin\AppData\Roaming\1.exe
          "C:\Users\Admin\AppData\Roaming\1.exe"
          3⤵
          • Sets file execution options in registry
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Checks processor information in registry
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of UnmapMainImage
          • Suspicious use of WriteProcessMemory
          PID:1416
          • C:\Windows\SysWOW64\explorer.exe
            C:\Windows\SysWOW64\explorer.exe
            4⤵
            • Modifies firewall policy service
            • Sets file execution options in registry
            • Checks BIOS information in registry
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Checks processor information in registry
            • Enumerates system info in registry
            • Modifies Internet Explorer Protected Mode
            • Modifies Internet Explorer Protected Mode Banner
            • Modifies Internet Explorer settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2560
    • C:\Windows\system32\DllHost.exe
      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
      1⤵
        PID:1528
      • C:\Windows\system32\DllHost.exe
        C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
        1⤵
          PID:1844

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Roaming\1.exe

          Filesize

          255KB

          MD5

          9c94decb82adea9cf528ddb56ff5fef1

          SHA1

          d0d3dfb1ea87ea5a72a8e759e35c4bdaed4cfabb

          SHA256

          2a59aa5d2ed61d359908f7cf6c8b099104627869c778a61d92201f392e7aa85e

          SHA512

          3ab32bb2abb5b92e49cc322d29f0bdbc8de79aace3782bd30079455ffcc6f07ecd7c8d10522c0fce07dade813219886fdab7f8ff9e91685a2af42e22302e393c

        • \Users\Admin\AppData\Roaming\2.exe

          Filesize

          186KB

          MD5

          5adfa47d7c60b040350f0030c73e4a8f

          SHA1

          cd396b9c81718a20f34413f73082690051a708e3

          SHA256

          e1014e6e143d5bd95b776777c730ec7c5ba67b82d9e60e78c28ff9eebb3ea2b8

          SHA512

          ffd7f515cd3670bd66ed096e77b9845d5e3566ff12755a1ab870dceff3d9d5081e518c5da72f6821727de2ead7d5df18246786968c9abb514a0699992e4a084a

        • memory/268-28-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB

        • memory/268-27-0x0000000000290000-0x0000000000291000-memory.dmp

          Filesize

          4KB

        • memory/1228-14-0x00000000024A0000-0x00000000024B5000-memory.dmp

          Filesize

          84KB

        • memory/1228-16-0x00000000024A0000-0x00000000024B5000-memory.dmp

          Filesize

          84KB

        • memory/1228-24-0x00000000024C0000-0x00000000024C1000-memory.dmp

          Filesize

          4KB

        • memory/1228-22-0x00000000024A0000-0x00000000024B5000-memory.dmp

          Filesize

          84KB

        • memory/1228-12-0x00000000024A0000-0x00000000024B5000-memory.dmp

          Filesize

          84KB

        • memory/1228-18-0x00000000024A0000-0x00000000024B5000-memory.dmp

          Filesize

          84KB

        • memory/1228-20-0x00000000024A0000-0x00000000024B5000-memory.dmp

          Filesize

          84KB

        • memory/1228-26-0x00000000024A0000-0x00000000024B5000-memory.dmp

          Filesize

          84KB

        • memory/1228-29-0x00000000024A0000-0x00000000024B5000-memory.dmp

          Filesize

          84KB

        • memory/1228-10-0x00000000024A0000-0x00000000024B5000-memory.dmp

          Filesize

          84KB

        • memory/1228-8-0x00000000024A0000-0x00000000024B5000-memory.dmp

          Filesize

          84KB

        • memory/1228-6-0x00000000024A0000-0x00000000024B5000-memory.dmp

          Filesize

          84KB

        • memory/1228-60-0x00000000024A0000-0x00000000024B5000-memory.dmp

          Filesize

          84KB

        • memory/1228-59-0x00000000024A0000-0x00000000024B5000-memory.dmp

          Filesize

          84KB

        • memory/1228-58-0x00000000024A0000-0x00000000024B5000-memory.dmp

          Filesize

          84KB

        • memory/1228-57-0x00000000024A0000-0x00000000024B5000-memory.dmp

          Filesize

          84KB

        • memory/1416-35-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/1416-37-0x0000000000550000-0x00000000005B6000-memory.dmp

          Filesize

          408KB

        • memory/1416-41-0x0000000000550000-0x00000000005B6000-memory.dmp

          Filesize

          408KB

        • memory/1416-44-0x0000000002240000-0x000000000224C000-memory.dmp

          Filesize

          48KB

        • memory/1416-43-0x0000000002200000-0x0000000002201000-memory.dmp

          Filesize

          4KB

        • memory/1416-45-0x0000000000550000-0x00000000005B6000-memory.dmp

          Filesize

          408KB

        • memory/1416-42-0x0000000077E30000-0x0000000077E31000-memory.dmp

          Filesize

          4KB

        • memory/1416-63-0x0000000000550000-0x00000000005B6000-memory.dmp

          Filesize

          408KB

        • memory/1416-38-0x00000000003B0000-0x00000000003B6000-memory.dmp

          Filesize

          24KB

        • memory/1416-64-0x00000000003B0000-0x00000000003B6000-memory.dmp

          Filesize

          24KB

        • memory/1416-62-0x0000000002220000-0x0000000002221000-memory.dmp

          Filesize

          4KB

        • memory/1416-39-0x00000000003C0000-0x00000000003CD000-memory.dmp

          Filesize

          52KB

        • memory/1416-36-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/1416-34-0x0000000000360000-0x0000000000361000-memory.dmp

          Filesize

          4KB

        • memory/2560-48-0x0000000077E20000-0x0000000077FA1000-memory.dmp

          Filesize

          1.5MB

        • memory/2560-52-0x0000000077E20000-0x0000000077FA1000-memory.dmp

          Filesize

          1.5MB

        • memory/2560-53-0x0000000077E20000-0x0000000077FA1000-memory.dmp

          Filesize

          1.5MB

        • memory/2560-51-0x0000000077E20000-0x0000000077FA1000-memory.dmp

          Filesize

          1.5MB

        • memory/2560-54-0x0000000000090000-0x0000000000139000-memory.dmp

          Filesize

          676KB

        • memory/2560-50-0x0000000077E20000-0x0000000077FA1000-memory.dmp

          Filesize

          1.5MB

        • memory/2560-49-0x0000000000090000-0x0000000000139000-memory.dmp

          Filesize

          676KB

        • memory/2560-47-0x0000000077E20000-0x0000000077FA1000-memory.dmp

          Filesize

          1.5MB

        • memory/2560-65-0x0000000077E20000-0x0000000077FA1000-memory.dmp

          Filesize

          1.5MB

        • memory/2560-66-0x0000000077E20000-0x0000000077FA1000-memory.dmp

          Filesize

          1.5MB

        • memory/2560-67-0x0000000077E20000-0x0000000077FA1000-memory.dmp

          Filesize

          1.5MB

        • memory/2560-68-0x0000000077E20000-0x0000000077FA1000-memory.dmp

          Filesize

          1.5MB

        • memory/2560-69-0x0000000077E20000-0x0000000077FA1000-memory.dmp

          Filesize

          1.5MB

        • memory/2560-70-0x0000000077E20000-0x0000000077FA1000-memory.dmp

          Filesize

          1.5MB

        • memory/2560-71-0x0000000077E20000-0x0000000077FA1000-memory.dmp

          Filesize

          1.5MB

        • memory/2560-72-0x0000000077E20000-0x0000000077FA1000-memory.dmp

          Filesize

          1.5MB

        • memory/2560-73-0x0000000077E20000-0x0000000077FA1000-memory.dmp

          Filesize

          1.5MB

        • memory/2560-74-0x0000000077E20000-0x0000000077FA1000-memory.dmp

          Filesize

          1.5MB

        • memory/2560-75-0x0000000077E20000-0x0000000077FA1000-memory.dmp

          Filesize

          1.5MB

        • memory/2560-76-0x0000000000090000-0x0000000000139000-memory.dmp

          Filesize

          676KB

        • memory/2560-79-0x0000000077E20000-0x0000000077FA1000-memory.dmp

          Filesize

          1.5MB

        • memory/2560-80-0x0000000077E20000-0x0000000077FA1000-memory.dmp

          Filesize

          1.5MB