Analysis
-
max time kernel
151s -
max time network
117s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
10-09-2021 15:07
Static task
static1
Behavioral task
behavioral1
Sample
b64n.txt.exe
Resource
win7-en
windows7_x64
0 signatures
0 seconds
General
-
Target
b64n.txt.exe
-
Size
257KB
-
MD5
f49074ddc37710861d7832476ba23e6c
-
SHA1
fa898edbd183fe50c582e4dd278aff0735c3c5ff
-
SHA256
ff575a3ae768fff422e4945ba5eae5fd779566ac9c708ff52c40280a0b9b26b0
-
SHA512
b3d648060115b236530c9cac5520b7f9e265b17c7a8fc108596fde6c207a1026e2c2da4aa68fa9efe28b69cc449864a8992c17a3eb94f25cc031564a483d68bb
Malware Config
Extracted
Family
gootkit
Botnet
777
C2
madregobilsg.com
kerymarynicegross.com
pillygreamstronh.com
charnchiumbong.com
kiwimujirahdron.com
Attributes
-
vendor_id
777
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
b64n.txt.exeb64n.txt.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b64n.txt.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b64n.txt.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 5 IoCs
Processes:
b64n.txt.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" b64n.txt.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" b64n.txt.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" b64n.txt.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" b64n.txt.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" b64n.txt.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
b64n.txt.exepid process 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe 664 b64n.txt.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
b64n.txt.exedescription pid process target process PID 664 wrote to memory of 376 664 b64n.txt.exe b64n.txt.exe PID 664 wrote to memory of 376 664 b64n.txt.exe b64n.txt.exe PID 664 wrote to memory of 376 664 b64n.txt.exe b64n.txt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b64n.txt.exe"C:\Users\Admin\AppData\Local\Temp\b64n.txt.exe"1⤵
- Checks BIOS information in registry
- Modifies Internet Explorer Protected Mode
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Users\Admin\AppData\Local\Temp\b64n.txt.exeC:\Users\Admin\AppData\Local\Temp\b64n.txt.exe --vwxyz2⤵
- Checks BIOS information in registry
PID:376
-