Analysis
-
max time kernel
96s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
24-05-2022 21:29
Static task
static1
Behavioral task
behavioral1
Sample
bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exe
Resource
win10v2004-20220414-en
General
-
Target
bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exe
-
Size
3.2MB
-
MD5
c52f5ca43480573ed5d4b5366fad2be0
-
SHA1
b3bec5af80d4f81f823a339229a6f4d5059498b7
-
SHA256
bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1
-
SHA512
1a57f394f1399da752592972a45790db00afdaed4b5e0d0e3f0ac371bb23a7706ad87849198ad57263ce4f67c1496a737eb333427f87d0e0c562387f1fa0f096
Malware Config
Signatures
-
Processes:
resource yara_rule \??\c:\Éñ;\bihustc.exe aspack_v212_v242 C:\Éñ;\bihustc.exe aspack_v212_v242 -
Executes dropped EXE 1 IoCs
Processes:
bihustc.exepid process 1992 bihustc.exe -
Unexpected DNS network traffic destination 30 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 114.114.114.114 Destination IP 223.6.6.6 Destination IP 223.5.5.5 Destination IP 223.5.5.5 Destination IP 223.5.5.5 Destination IP 114.114.114.114 Destination IP 223.6.6.6 Destination IP 223.6.6.6 Destination IP 114.114.114.114 Destination IP 223.6.6.6 Destination IP 223.5.5.5 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 223.5.5.5 Destination IP 223.6.6.6 Destination IP 223.6.6.6 Destination IP 114.114.114.114 Destination IP 223.6.6.6 Destination IP 223.5.5.5 Destination IP 223.5.5.5 Destination IP 223.6.6.6 Destination IP 114.114.114.114 Destination IP 223.5.5.5 Destination IP 223.6.6.6 Destination IP 114.114.114.114 Destination IP 223.6.6.6 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 223.5.5.5 Destination IP 223.5.5.5 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exebihustc.exedescription ioc process File opened for modification \??\PhysicalDrive0 bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exe File opened for modification \??\PhysicalDrive0 bihustc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 5008 4628 WerFault.exe bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exe 1296 1992 WerFault.exe bihustc.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exebihustc.exepid process 4628 bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exe 4628 bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exe 1992 bihustc.exe 1992 bihustc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
bihustc.exepid process 1992 bihustc.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exebihustc.exepid process 4628 bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exe 4628 bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exe 1992 bihustc.exe 1992 bihustc.exe 1992 bihustc.exe 1992 bihustc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exedescription pid process target process PID 4628 wrote to memory of 1992 4628 bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exe bihustc.exe PID 4628 wrote to memory of 1992 4628 bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exe bihustc.exe PID 4628 wrote to memory of 1992 4628 bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exe bihustc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exe"C:\Users\Admin\AppData\Local\Temp\bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 5562⤵
- Program crash
PID:5008
-
-
\??\c:\Éñ;\bihustc.exe"c:\Éñ;\bihustc.exe" MOV 4628 C:\Users\Admin\AppData\Local\Temp\bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exe2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1992 -s 5563⤵
- Program crash
PID:1296
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4628 -ip 46281⤵PID:4500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1992 -ip 19921⤵PID:340
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
639B
MD50ddd1443fa162626d761f1ada8605f5d
SHA1c07044e5e3042ea33dc20852844c870fecaaae55
SHA256d33368d625624615c40c7446e2dac4e98c2707928e5a45b7dbb0c4e80a3983eb
SHA512381c39179f599b6beb996167f3edf04ae596fd6ff821bf2e32ff736d22e617ae074d07400705fa1687767d7eabd8c4bebef1b4f0ed7d41c69dade1b60b4b8caf
-
Filesize
377B
MD5aa00db81bc6104ef448a9fd00279748e
SHA159512bc8020e06ab7c0a8cf0b2629e805c649b70
SHA2567f6c69913ee77adcafd90a37827c62a4213d71ce986c625bd3de9d278bc32d81
SHA512b974a88cc2588fae720c58a4f55639532886b1579f0d2f223833a0e85c5d3f845e685769650145f9c78c0d668bbb585a4934187b82e7a5122a08dcf17799bbd0
-
Filesize
3.2MB
MD5c52f5ca43480573ed5d4b5366fad2be0
SHA1b3bec5af80d4f81f823a339229a6f4d5059498b7
SHA256bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1
SHA5121a57f394f1399da752592972a45790db00afdaed4b5e0d0e3f0ac371bb23a7706ad87849198ad57263ce4f67c1496a737eb333427f87d0e0c562387f1fa0f096
-
Filesize
7KB
MD5c39b6868c3dfdd813db1804d71d1b4ca
SHA1ecd4dc6be0e4919adcd0370b4062fa3a840a576f
SHA256055a8abebe2f2fc6bd9cf2d87bdcfcffdbf3c6563cddabb09840a4d126e361f6
SHA51213beaa0edbe24f0c5a73b45be6c43e65b54f07443d8e234908e5fb06d7d24485c6a5d89366b15398dfd065fbc072c35957d2c635068ebc227707237b4f8effa7
-
Filesize
7KB
MD5c39b6868c3dfdd813db1804d71d1b4ca
SHA1ecd4dc6be0e4919adcd0370b4062fa3a840a576f
SHA256055a8abebe2f2fc6bd9cf2d87bdcfcffdbf3c6563cddabb09840a4d126e361f6
SHA51213beaa0edbe24f0c5a73b45be6c43e65b54f07443d8e234908e5fb06d7d24485c6a5d89366b15398dfd065fbc072c35957d2c635068ebc227707237b4f8effa7
-
Filesize
7KB
MD5c39b6868c3dfdd813db1804d71d1b4ca
SHA1ecd4dc6be0e4919adcd0370b4062fa3a840a576f
SHA256055a8abebe2f2fc6bd9cf2d87bdcfcffdbf3c6563cddabb09840a4d126e361f6
SHA51213beaa0edbe24f0c5a73b45be6c43e65b54f07443d8e234908e5fb06d7d24485c6a5d89366b15398dfd065fbc072c35957d2c635068ebc227707237b4f8effa7
-
Filesize
7KB
MD5c39b6868c3dfdd813db1804d71d1b4ca
SHA1ecd4dc6be0e4919adcd0370b4062fa3a840a576f
SHA256055a8abebe2f2fc6bd9cf2d87bdcfcffdbf3c6563cddabb09840a4d126e361f6
SHA51213beaa0edbe24f0c5a73b45be6c43e65b54f07443d8e234908e5fb06d7d24485c6a5d89366b15398dfd065fbc072c35957d2c635068ebc227707237b4f8effa7
-
Filesize
1KB
MD5cb675e6b2f7085ba2af2b1c17fc0b4f0
SHA1df50a8be72652acf399e1c50ac1fcce019c6ade5
SHA256b59c9bc5f35ca2e747a5a67267ee3c467b3319262e9f51219e537f09562fcc65
SHA51285e72a0554ff70d0233249bf4dd8509585ded52c4a6348fb6aa3144e2a14fc7750a65354e4614e917d8c7e9e483d1705ea674867fe09dc114e17f8a79054a6bb
-
Filesize
3.2MB
MD5c52f5ca43480573ed5d4b5366fad2be0
SHA1b3bec5af80d4f81f823a339229a6f4d5059498b7
SHA256bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1
SHA5121a57f394f1399da752592972a45790db00afdaed4b5e0d0e3f0ac371bb23a7706ad87849198ad57263ce4f67c1496a737eb333427f87d0e0c562387f1fa0f096