Analysis
-
max time kernel
82s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
24-05-2022 21:29
Static task
static1
Behavioral task
behavioral1
Sample
bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exe
Resource
win10v2004-20220414-en
General
-
Target
bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exe
-
Size
3.2MB
-
MD5
c52f5ca43480573ed5d4b5366fad2be0
-
SHA1
b3bec5af80d4f81f823a339229a6f4d5059498b7
-
SHA256
bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1
-
SHA512
1a57f394f1399da752592972a45790db00afdaed4b5e0d0e3f0ac371bb23a7706ad87849198ad57263ce4f67c1496a737eb333427f87d0e0c562387f1fa0f096
Malware Config
Signatures
-
Processes:
resource yara_rule \Éñ;\bihustc.exe aspack_v212_v242 \Éñ;\bihustc.exe aspack_v212_v242 C:\Éñ;\bihustc.exe aspack_v212_v242 \??\c:\Éñ;\bihustc.exe aspack_v212_v242 \Éñ;\bihustc.exe aspack_v212_v242 \Éñ;\bihustc.exe aspack_v212_v242 -
Executes dropped EXE 1 IoCs
Processes:
bihustc.exepid process 776 bihustc.exe -
Deletes itself 1 IoCs
Processes:
bihustc.exepid process 776 bihustc.exe -
Loads dropped DLL 4 IoCs
Processes:
bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exebihustc.exepid process 1800 bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exe 1800 bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exe 776 bihustc.exe 776 bihustc.exe -
Unexpected DNS network traffic destination 30 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 223.5.5.5 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 223.5.5.5 Destination IP 114.114.114.114 Destination IP 223.5.5.5 Destination IP 114.114.114.114 Destination IP 223.6.6.6 Destination IP 223.6.6.6 Destination IP 223.6.6.6 Destination IP 223.6.6.6 Destination IP 223.5.5.5 Destination IP 223.6.6.6 Destination IP 223.6.6.6 Destination IP 223.6.6.6 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 223.5.5.5 Destination IP 223.5.5.5 Destination IP 223.5.5.5 Destination IP 223.5.5.5 Destination IP 223.5.5.5 Destination IP 223.6.6.6 Destination IP 223.6.6.6 Destination IP 223.6.6.6 Destination IP 223.5.5.5 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exebihustc.exedescription ioc process File opened for modification \??\PhysicalDrive0 bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exe File opened for modification \??\PhysicalDrive0 bihustc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
bihustc.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main bihustc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exebihustc.exepid process 1800 bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exe 776 bihustc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
AUDIODG.EXEdescription pid process Token: 33 2008 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2008 AUDIODG.EXE Token: 33 2008 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2008 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exebihustc.exepid process 1800 bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exe 1800 bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exe 776 bihustc.exe 776 bihustc.exe 776 bihustc.exe 776 bihustc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exedescription pid process target process PID 1800 wrote to memory of 776 1800 bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exe bihustc.exe PID 1800 wrote to memory of 776 1800 bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exe bihustc.exe PID 1800 wrote to memory of 776 1800 bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exe bihustc.exe PID 1800 wrote to memory of 776 1800 bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exe bihustc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exe"C:\Users\Admin\AppData\Local\Temp\bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1800 -
\??\c:\Éñ;\bihustc.exe"c:\Éñ;\bihustc.exe" MOV 1800 C:\Users\Admin\AppData\Local\Temp\bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exe2⤵
- Executes dropped EXE
- Deletes itself
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:776
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5441⤵
- Suspicious use of AdjustPrivilegeToken
PID:2008
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Éñ;\±Ú»¢Éñ;C.lnkFilesize
594B
MD5b4d33e00270ca3a7dc7b66eab1cf0228
SHA1f50123ba04804b6b8c4fb068473cec06730dc47c
SHA256509a2ae905eddb6687129186da65b46d62a1b52e28ff720170c5805aee4cc159
SHA512e7fbb24653b3fee1204c6b0c29e5156c83d0e4c96a2646e88c214dd8dd754866dcf26385a576f647a15fa1dc493efcf3bc7ac895dcb2adefd74be88e012ff2fe
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Éñ;\жÔرڻ¢Éñ;C.lnkFilesize
602B
MD59f015d8fbfc58ebc19febbccb76a2923
SHA1e33be423d6f36d0e7c0620479d5dc2e397a97b22
SHA2568aa9ab8ad0ea3eeef249fb64f77028e0f77f476bc275be46fa83f0b9b7f5ec05
SHA5129214614d8266de55c093d808c4ef69e22b9576e91d51f2902401d06cd4054b03d76a1f055ae5434b1a9cb3e3b1702813a9b1e55e2ae2abe2ddd07dc2dd09cc1e
-
C:\Users\Public\Desktop\±Ú»¢Éñ;C.lnkFilesize
409B
MD5f84550646130a88fa94139a229ec86b7
SHA1ba198f73f39d1a321d612b8825a24a1285e611c4
SHA25659b1a9a41e7535645c9c924cf938115987667bfe8d6f6910889f32e50aff3adc
SHA512f1049682e2842b6ceb2c5cecdd78f412f04f645710c94582c3646933e0106c06f503547c7e4449d4c9dd3317dd45978bf8de6190532bc9e3355c302d2602d37f
-
C:\Éñ;\bihustc.exeFilesize
3.2MB
MD5c52f5ca43480573ed5d4b5366fad2be0
SHA1b3bec5af80d4f81f823a339229a6f4d5059498b7
SHA256bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1
SHA5121a57f394f1399da752592972a45790db00afdaed4b5e0d0e3f0ac371bb23a7706ad87849198ad57263ce4f67c1496a737eb333427f87d0e0c562387f1fa0f096
-
\??\c:\Éñ;\DownloadTemp\LoginServerList.xmlFilesize
7KB
MD5c39b6868c3dfdd813db1804d71d1b4ca
SHA1ecd4dc6be0e4919adcd0370b4062fa3a840a576f
SHA256055a8abebe2f2fc6bd9cf2d87bdcfcffdbf3c6563cddabb09840a4d126e361f6
SHA51213beaa0edbe24f0c5a73b45be6c43e65b54f07443d8e234908e5fb06d7d24485c6a5d89366b15398dfd065fbc072c35957d2c635068ebc227707237b4f8effa7
-
\??\c:\Éñ;\DownloadTemp\mtdl_OEMSVRLIST1_tmp.datFilesize
7KB
MD5c39b6868c3dfdd813db1804d71d1b4ca
SHA1ecd4dc6be0e4919adcd0370b4062fa3a840a576f
SHA256055a8abebe2f2fc6bd9cf2d87bdcfcffdbf3c6563cddabb09840a4d126e361f6
SHA51213beaa0edbe24f0c5a73b45be6c43e65b54f07443d8e234908e5fb06d7d24485c6a5d89366b15398dfd065fbc072c35957d2c635068ebc227707237b4f8effa7
-
\??\c:\Éñ;\DownloadTemp\mtdl_OEMSVRLIST3_tmp.datFilesize
7KB
MD5c39b6868c3dfdd813db1804d71d1b4ca
SHA1ecd4dc6be0e4919adcd0370b4062fa3a840a576f
SHA256055a8abebe2f2fc6bd9cf2d87bdcfcffdbf3c6563cddabb09840a4d126e361f6
SHA51213beaa0edbe24f0c5a73b45be6c43e65b54f07443d8e234908e5fb06d7d24485c6a5d89366b15398dfd065fbc072c35957d2c635068ebc227707237b4f8effa7
-
\??\c:\Éñ;\DownloadTemp\mtdl_OEMSVRLIST4_tmp.datFilesize
7KB
MD5c39b6868c3dfdd813db1804d71d1b4ca
SHA1ecd4dc6be0e4919adcd0370b4062fa3a840a576f
SHA256055a8abebe2f2fc6bd9cf2d87bdcfcffdbf3c6563cddabb09840a4d126e361f6
SHA51213beaa0edbe24f0c5a73b45be6c43e65b54f07443d8e234908e5fb06d7d24485c6a5d89366b15398dfd065fbc072c35957d2c635068ebc227707237b4f8effa7
-
\??\c:\Éñ;\Setting\GameStartSetting.xmlFilesize
1KB
MD5cb675e6b2f7085ba2af2b1c17fc0b4f0
SHA1df50a8be72652acf399e1c50ac1fcce019c6ade5
SHA256b59c9bc5f35ca2e747a5a67267ee3c467b3319262e9f51219e537f09562fcc65
SHA51285e72a0554ff70d0233249bf4dd8509585ded52c4a6348fb6aa3144e2a14fc7750a65354e4614e917d8c7e9e483d1705ea674867fe09dc114e17f8a79054a6bb
-
\??\c:\Éñ;\bihustc.exeFilesize
3.2MB
MD5c52f5ca43480573ed5d4b5366fad2be0
SHA1b3bec5af80d4f81f823a339229a6f4d5059498b7
SHA256bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1
SHA5121a57f394f1399da752592972a45790db00afdaed4b5e0d0e3f0ac371bb23a7706ad87849198ad57263ce4f67c1496a737eb333427f87d0e0c562387f1fa0f096
-
\Éñ;\bihustc.exeFilesize
3.2MB
MD5c52f5ca43480573ed5d4b5366fad2be0
SHA1b3bec5af80d4f81f823a339229a6f4d5059498b7
SHA256bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1
SHA5121a57f394f1399da752592972a45790db00afdaed4b5e0d0e3f0ac371bb23a7706ad87849198ad57263ce4f67c1496a737eb333427f87d0e0c562387f1fa0f096
-
\Éñ;\bihustc.exeFilesize
3.2MB
MD5c52f5ca43480573ed5d4b5366fad2be0
SHA1b3bec5af80d4f81f823a339229a6f4d5059498b7
SHA256bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1
SHA5121a57f394f1399da752592972a45790db00afdaed4b5e0d0e3f0ac371bb23a7706ad87849198ad57263ce4f67c1496a737eb333427f87d0e0c562387f1fa0f096
-
\Éñ;\bihustc.exeFilesize
3.2MB
MD5c52f5ca43480573ed5d4b5366fad2be0
SHA1b3bec5af80d4f81f823a339229a6f4d5059498b7
SHA256bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1
SHA5121a57f394f1399da752592972a45790db00afdaed4b5e0d0e3f0ac371bb23a7706ad87849198ad57263ce4f67c1496a737eb333427f87d0e0c562387f1fa0f096
-
\Éñ;\bihustc.exeFilesize
3.2MB
MD5c52f5ca43480573ed5d4b5366fad2be0
SHA1b3bec5af80d4f81f823a339229a6f4d5059498b7
SHA256bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1
SHA5121a57f394f1399da752592972a45790db00afdaed4b5e0d0e3f0ac371bb23a7706ad87849198ad57263ce4f67c1496a737eb333427f87d0e0c562387f1fa0f096
-
memory/776-66-0x0000000000400000-0x00000000008BB000-memory.dmpFilesize
4.7MB
-
memory/776-65-0x0000000000400000-0x00000000008BB000-memory.dmpFilesize
4.7MB
-
memory/776-64-0x0000000000400000-0x00000000008BB000-memory.dmpFilesize
4.7MB
-
memory/776-60-0x0000000000000000-mapping.dmp
-
memory/1800-54-0x0000000074E91000-0x0000000074E93000-memory.dmpFilesize
8KB
-
memory/1800-63-0x0000000000400000-0x00000000008BB000-memory.dmpFilesize
4.7MB
-
memory/1800-57-0x0000000000400000-0x00000000008BB000-memory.dmpFilesize
4.7MB
-
memory/1800-56-0x0000000000400000-0x00000000008BB000-memory.dmpFilesize
4.7MB
-
memory/1800-55-0x0000000000400000-0x00000000008BB000-memory.dmpFilesize
4.7MB