Analysis
-
max time kernel
147s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 00:34
Static task
static1
Behavioral task
behavioral1
Sample
888e0940fba3c3c8a3d85d1b9bc21583ee01d8b2879d88b2a5596a22f4c20704.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
888e0940fba3c3c8a3d85d1b9bc21583ee01d8b2879d88b2a5596a22f4c20704.exe
Resource
win10v2004-20220414-en
General
-
Target
888e0940fba3c3c8a3d85d1b9bc21583ee01d8b2879d88b2a5596a22f4c20704.exe
-
Size
1.5MB
-
MD5
d06994d9a3382a107e18b6d3e7ec9e5a
-
SHA1
d3d8485f3b38c1f4618268aafe536ec55f973b1e
-
SHA256
888e0940fba3c3c8a3d85d1b9bc21583ee01d8b2879d88b2a5596a22f4c20704
-
SHA512
e6895e662bd51754783dd37dcd02524b1b603392953bfde984e86ee8e8a731f7940de6d7746616751d3595c854a9c53d60ffe784acf48764624074c6c1b0703a
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Bugreport.dllpid process 1940 Bugreport.dll -
Processes:
resource yara_rule behavioral1/memory/1672-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1672-56-0x0000000002B20000-0x0000000002B92000-memory.dmp upx -
Loads dropped DLL 2 IoCs
Processes:
888e0940fba3c3c8a3d85d1b9bc21583ee01d8b2879d88b2a5596a22f4c20704.exepid process 1672 888e0940fba3c3c8a3d85d1b9bc21583ee01d8b2879d88b2a5596a22f4c20704.exe 1672 888e0940fba3c3c8a3d85d1b9bc21583ee01d8b2879d88b2a5596a22f4c20704.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
888e0940fba3c3c8a3d85d1b9bc21583ee01d8b2879d88b2a5596a22f4c20704.exedescription ioc process File opened for modification \??\PhysicalDrive0 888e0940fba3c3c8a3d85d1b9bc21583ee01d8b2879d88b2a5596a22f4c20704.exe -
Processes:
888e0940fba3c3c8a3d85d1b9bc21583ee01d8b2879d88b2a5596a22f4c20704.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main 888e0940fba3c3c8a3d85d1b9bc21583ee01d8b2879d88b2a5596a22f4c20704.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl 888e0940fba3c3c8a3d85d1b9bc21583ee01d8b2879d88b2a5596a22f4c20704.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\888e0940fba3c3c8a3d85d1b9bc21583ee01d8b2879d88b2a5596a22f4c20704.exe = "11001" 888e0940fba3c3c8a3d85d1b9bc21583ee01d8b2879d88b2a5596a22f4c20704.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING 888e0940fba3c3c8a3d85d1b9bc21583ee01d8b2879d88b2a5596a22f4c20704.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING\888e0940fba3c3c8a3d85d1b9bc21583ee01d8b2879d88b2a5596a22f4c20704.exe = "1" 888e0940fba3c3c8a3d85d1b9bc21583ee01d8b2879d88b2a5596a22f4c20704.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION 888e0940fba3c3c8a3d85d1b9bc21583ee01d8b2879d88b2a5596a22f4c20704.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
888e0940fba3c3c8a3d85d1b9bc21583ee01d8b2879d88b2a5596a22f4c20704.exepid process 1672 888e0940fba3c3c8a3d85d1b9bc21583ee01d8b2879d88b2a5596a22f4c20704.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
888e0940fba3c3c8a3d85d1b9bc21583ee01d8b2879d88b2a5596a22f4c20704.exeBugreport.dllpid process 1672 888e0940fba3c3c8a3d85d1b9bc21583ee01d8b2879d88b2a5596a22f4c20704.exe 1672 888e0940fba3c3c8a3d85d1b9bc21583ee01d8b2879d88b2a5596a22f4c20704.exe 1672 888e0940fba3c3c8a3d85d1b9bc21583ee01d8b2879d88b2a5596a22f4c20704.exe 1672 888e0940fba3c3c8a3d85d1b9bc21583ee01d8b2879d88b2a5596a22f4c20704.exe 1672 888e0940fba3c3c8a3d85d1b9bc21583ee01d8b2879d88b2a5596a22f4c20704.exe 1672 888e0940fba3c3c8a3d85d1b9bc21583ee01d8b2879d88b2a5596a22f4c20704.exe 1940 Bugreport.dll -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
888e0940fba3c3c8a3d85d1b9bc21583ee01d8b2879d88b2a5596a22f4c20704.exedescription pid process target process PID 1672 wrote to memory of 1940 1672 888e0940fba3c3c8a3d85d1b9bc21583ee01d8b2879d88b2a5596a22f4c20704.exe Bugreport.dll PID 1672 wrote to memory of 1940 1672 888e0940fba3c3c8a3d85d1b9bc21583ee01d8b2879d88b2a5596a22f4c20704.exe Bugreport.dll PID 1672 wrote to memory of 1940 1672 888e0940fba3c3c8a3d85d1b9bc21583ee01d8b2879d88b2a5596a22f4c20704.exe Bugreport.dll PID 1672 wrote to memory of 1940 1672 888e0940fba3c3c8a3d85d1b9bc21583ee01d8b2879d88b2a5596a22f4c20704.exe Bugreport.dll
Processes
-
C:\Users\Admin\AppData\Local\Temp\888e0940fba3c3c8a3d85d1b9bc21583ee01d8b2879d88b2a5596a22f4c20704.exe"C:\Users\Admin\AppData\Local\Temp\888e0940fba3c3c8a3d85d1b9bc21583ee01d8b2879d88b2a5596a22f4c20704.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\data\Bugreport.dllC:\Users\Admin\AppData\Local\Temp\data\Bugreport.dll Bugreport %E8%BD%AC%E5%8F%91%E9%87%8D%202⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\data\Bugreport.dllFilesize
156KB
MD5608f59eaed0cad21b19100535490969a
SHA1dac5dbe7b66e815f9d3db495c0fbe23bc963f10e
SHA256d28fe1e95ecb6cb263fb418c5bc6ace8e35ba0b8841a642463b094e46923e753
SHA512da6a5d879a96b06c969f9964e568f657d082ac4d0986ea1d62024af81139f8ae23591608e83bae12a636acdecb307a6dcb2f45819f5a4ec483ae6083b2a06143
-
C:\Users\Admin\AppData\Local\Temp\data\Bugreport.iniFilesize
52B
MD50e7669aad8264a2a7db58860f4332e95
SHA1d04c40a4b26048ffa1abba9e349500216cab57aa
SHA256d3481440a0263b4d5d659ab60164d345b6326b1cebaf546a4d921f5e52004254
SHA512c07292712d2246b7183332ec9ac4ea8a6205dcc0b744f180d31c417258a2cb22fbdaf0d44e0a35c6106ccb8f29efed2964d6a00212c029ffc9356ad23e51ee12
-
\Users\Admin\AppData\Local\Temp\data\Bugreport.dllFilesize
156KB
MD5608f59eaed0cad21b19100535490969a
SHA1dac5dbe7b66e815f9d3db495c0fbe23bc963f10e
SHA256d28fe1e95ecb6cb263fb418c5bc6ace8e35ba0b8841a642463b094e46923e753
SHA512da6a5d879a96b06c969f9964e568f657d082ac4d0986ea1d62024af81139f8ae23591608e83bae12a636acdecb307a6dcb2f45819f5a4ec483ae6083b2a06143
-
\Users\Admin\AppData\Local\Temp\data\Bugreport.dllFilesize
156KB
MD5608f59eaed0cad21b19100535490969a
SHA1dac5dbe7b66e815f9d3db495c0fbe23bc963f10e
SHA256d28fe1e95ecb6cb263fb418c5bc6ace8e35ba0b8841a642463b094e46923e753
SHA512da6a5d879a96b06c969f9964e568f657d082ac4d0986ea1d62024af81139f8ae23591608e83bae12a636acdecb307a6dcb2f45819f5a4ec483ae6083b2a06143
-
memory/1672-54-0x00000000763C1000-0x00000000763C3000-memory.dmpFilesize
8KB
-
memory/1672-55-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1672-56-0x0000000002B20000-0x0000000002B92000-memory.dmpFilesize
456KB
-
memory/1672-63-0x0000000006CA0000-0x0000000006CD6000-memory.dmpFilesize
216KB
-
memory/1940-59-0x0000000000000000-mapping.dmp
-
memory/1940-62-0x0000000000400000-0x0000000000436000-memory.dmpFilesize
216KB