Analysis
-
max time kernel
143s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2022 16:39
Static task
static1
Behavioral task
behavioral1
Sample
7f8c572116c3638d9904a1e076c2b960631f269e8f21aff09b61055197e00638.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7f8c572116c3638d9904a1e076c2b960631f269e8f21aff09b61055197e00638.exe
Resource
win10v2004-20220812-en
General
-
Target
7f8c572116c3638d9904a1e076c2b960631f269e8f21aff09b61055197e00638.exe
-
Size
373KB
-
MD5
ea3ac0aac395eadfe6362a9bdd36903f
-
SHA1
10f05cd28957eaaf375b25d7675c4cb894e91983
-
SHA256
7f8c572116c3638d9904a1e076c2b960631f269e8f21aff09b61055197e00638
-
SHA512
272658284437f429e6b390d5d65df1b1a229b1a04678963aa7eed972c5a89560d445be4e4be8f2ec99818d561b7890599113011c669abf2909302104fadbda46
-
SSDEEP
6144:SY94NTudsckh6IeJYr/qcRLT+C8uvQ7ukCGZV+J46E+6mcZpB:R9OisckheJ+PRLT+CfvifCx46EDmcZpB
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4648 rinst.exe 2688 bpk.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 7f8c572116c3638d9904a1e076c2b960631f269e8f21aff09b61055197e00638.exe -
Loads dropped DLL 4 IoCs
pid Process 2688 bpk.exe 2688 bpk.exe 2688 bpk.exe 1388 7f8c572116c3638d9904a1e076c2b960631f269e8f21aff09b61055197e00638.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\bpk = "C:\\Windows\\SysWOW64\\bpk.exe" bpk.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A} bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\ = "PK IE Plugin" bpk.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\bpkhk.dll rinst.exe File created C:\Windows\SysWOW64\bpkwb.dll rinst.exe File created C:\Windows\SysWOW64\inst.dat rinst.exe File created C:\Windows\SysWOW64\rinst.exe rinst.exe File opened for modification C:\Windows\SysWOW64\pk.bin bpk.exe File created C:\Windows\SysWOW64\pk.bin rinst.exe File created C:\Windows\SysWOW64\bpk.exe rinst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 46 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\VersionIndependentProgID bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\Programmable bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\FLAGS\ = "0" bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\bpkwb.dll" bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\ = "{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}" bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE\CLSID\ = "{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}" bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE\CurVer bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\VersionIndependentProgID\ = "PK.IE" bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\InprocServer32\ = "C:\\Windows\\SysWow64\\bpkwb.dll" bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\ = "{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}" bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\0 bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ProxyStubClsid32 bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\ = "{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}" bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE.1\CLSID\ = "{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}" bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\ = "IE Plugin Class" bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ProxyStubClsid32 bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\HELPDIR bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A} bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ = "IViewSource" bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE\ = "IE Class" bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE\CLSID bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\FLAGS bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\HELPDIR\ = "C:\\Windows\\SysWow64\\" bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ = "IViewSource" bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\Version = "1.0" bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE.1 bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\ProgID bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\TypeLib bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0 bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\ = "BPK IE Plugin Type Library" bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A} bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE.1\ = "IE Plugin Class" bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE.1\CLSID bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A} bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\ProgID\ = "PK.IE.1" bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\InprocServer32 bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\InprocServer32\ThreadingModel = "Apartment" bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A} bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\0\win32 bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE\CurVer\ = "PK.IE.1" bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\Version = "1.0" bpk.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4648 rinst.exe 4648 rinst.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2688 bpk.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2688 bpk.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2688 bpk.exe 2688 bpk.exe 2688 bpk.exe 2688 bpk.exe 2688 bpk.exe 2688 bpk.exe 2688 bpk.exe 2688 bpk.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1388 wrote to memory of 4648 1388 7f8c572116c3638d9904a1e076c2b960631f269e8f21aff09b61055197e00638.exe 80 PID 1388 wrote to memory of 4648 1388 7f8c572116c3638d9904a1e076c2b960631f269e8f21aff09b61055197e00638.exe 80 PID 1388 wrote to memory of 4648 1388 7f8c572116c3638d9904a1e076c2b960631f269e8f21aff09b61055197e00638.exe 80 PID 4648 wrote to memory of 2688 4648 rinst.exe 82 PID 4648 wrote to memory of 2688 4648 rinst.exe 82 PID 4648 wrote to memory of 2688 4648 rinst.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f8c572116c3638d9904a1e076c2b960631f269e8f21aff09b61055197e00638.exe"C:\Users\Admin\AppData\Local\Temp\7f8c572116c3638d9904a1e076c2b960631f269e8f21aff09b61055197e00638.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\bpk.exeC:\Windows\system32\bpk.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2688
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD5ad7b912feb61342311fba650f2b02be7
SHA1bc85139f7544971f72509532ced3b21b33a3c31b
SHA256903e60be5a10acc08ce564bec11a45a2264c4eef68d75822d023c5a776f6920a
SHA5126f9d09ba09892bb84aad8a096d066e721d362d1298a46b408a7d45dc0b7f1403f1873e17e8a8ccf1294087a5c2224834053d876e01bd338ef8e5d46408eea823
-
Filesize
8KB
MD50c7eab37c47d15a41f41c4b209e79274
SHA15e4e38d02274362f2ece0fe2cb17d2739df8f70d
SHA2568c1a8485fe05be1d1dd9694cb43cebededd5c97147cb9bddd4e60eb1da570e7b
SHA51210ccd7fd4785788aaea39f64fdd317867e7940d3d741e182418f379851840ddd35c1a27e6f2c5c26f0c385036d17e968fc5b97faa9ff1c0ea6c6d47eda153966
-
Filesize
40KB
MD581ed65c6eeeb197860cc72a0852d2342
SHA175eace72cbbd6cfa3bfd2544be684e67eea221c5
SHA256647e9a4cdd56653a08e938c4f03330cdc957845bd583c1f31ade9a5eb8507086
SHA512f1672dd193b2f8ad4771560b5077c466770bc0b0bc45fc1473164036b789daefe826f47779c4454ac446324cc75e274aa9079181e8e4b6dfd50db25cb41794eb
-
Filesize
996B
MD5f0d024be158768932e8e478c36854605
SHA116d4f38921669e3e37cec4b02127b5c4fc57aaf3
SHA256ca468b1cf639aa678574f8c1d89aa63a8ab3b82bab66ff99ff853896f4271fe4
SHA51250aa3840654670296d2785f77dc1993f5e0f681bb607fff54a7ee58439d867b26d4711ffd9816ce61765c4a91033471cd4b938e60802ed887a59b593976361de
-
Filesize
3KB
MD564bda3b5360f5a95dfd9baa278f90b21
SHA1abfe88a9efa0860ccb7e2cd4f2400bbd9be0fa0d
SHA2566897d787e9877fbabaf891bad537c0fc7e074debb517d7f8aa5322cf362a58d7
SHA5127d60128c750f823b6cc11ec60e4f72124b080651c139c674b750663275daa06dbd1d15dee52e3c0e0c4a3b2b45c63d9a059c256ea4889480db6bd144a1a9e609
-
Filesize
16KB
MD525ca20c1d62da229dc135015cef460e4
SHA1e351fcaee513197a89054d432e6747b3ad372baf
SHA256e07774d73ad137ea9d9eeab564d7844baf523cb26459ac2eae5e631403fcec81
SHA51245aa4f3cd9d91ae1ee9968c72dbcd5ab7d448225928af8283d5e04a64867cb5f940b228de6c753fd27124d3ea3e827c46695bcccc7dc9653efe9670844d7c117
-
Filesize
16KB
MD525ca20c1d62da229dc135015cef460e4
SHA1e351fcaee513197a89054d432e6747b3ad372baf
SHA256e07774d73ad137ea9d9eeab564d7844baf523cb26459ac2eae5e631403fcec81
SHA51245aa4f3cd9d91ae1ee9968c72dbcd5ab7d448225928af8283d5e04a64867cb5f940b228de6c753fd27124d3ea3e827c46695bcccc7dc9653efe9670844d7c117
-
Filesize
384KB
MD5ada1988031b565e0d529a546ac600aca
SHA131ea4a318da7193de8a2b11c9c19ea43eb68b18c
SHA256ddeb3dc9271d6d1c1481a10f12b9cb373edd48b165a40bf762f377804dbddcec
SHA512eb386eff5f7c3cf8e789c1c5f09f50a0740a02d865b0be772a2d8ed19ef9aba3c8a783da2165fc366f2d9bbba2135371420a470fa2eae0f65568aac9136e2343
-
Filesize
384KB
MD5ada1988031b565e0d529a546ac600aca
SHA131ea4a318da7193de8a2b11c9c19ea43eb68b18c
SHA256ddeb3dc9271d6d1c1481a10f12b9cb373edd48b165a40bf762f377804dbddcec
SHA512eb386eff5f7c3cf8e789c1c5f09f50a0740a02d865b0be772a2d8ed19ef9aba3c8a783da2165fc366f2d9bbba2135371420a470fa2eae0f65568aac9136e2343
-
Filesize
8KB
MD5c93434c190b7e1c5b7f8c5c3e95427b4
SHA1723d837180c0e9f572f13098008a80647b504eda
SHA256dc381580da21d22e498862192429f5fff0b1c95fd0e687b259d00c2df5b5a62d
SHA512d8525ba5bebf3700af85712d1f1ebc44d05ba7d62292dab183f9ee300278bfbce207cc21dfdd11f96babf08d348cd47ef66c416b9e0c5881311be01e52e63f8b
-
Filesize
8KB
MD5c93434c190b7e1c5b7f8c5c3e95427b4
SHA1723d837180c0e9f572f13098008a80647b504eda
SHA256dc381580da21d22e498862192429f5fff0b1c95fd0e687b259d00c2df5b5a62d
SHA512d8525ba5bebf3700af85712d1f1ebc44d05ba7d62292dab183f9ee300278bfbce207cc21dfdd11f96babf08d348cd47ef66c416b9e0c5881311be01e52e63f8b
-
Filesize
8KB
MD5c93434c190b7e1c5b7f8c5c3e95427b4
SHA1723d837180c0e9f572f13098008a80647b504eda
SHA256dc381580da21d22e498862192429f5fff0b1c95fd0e687b259d00c2df5b5a62d
SHA512d8525ba5bebf3700af85712d1f1ebc44d05ba7d62292dab183f9ee300278bfbce207cc21dfdd11f96babf08d348cd47ef66c416b9e0c5881311be01e52e63f8b
-
Filesize
40KB
MD55d6103059981886ee29698ef77006398
SHA102679e8da4f9c86481d4ae1280b31c73d4682eef
SHA256a2bc198ac23bc884dfdfb5d07824f673557d28493f23d7f86cfba498406a7cfa
SHA51256027d02135d1fa1a711507dd8f2985c45f1c71669a388d2363b9dcb88a85aef8fed9bdf8db56db2923fc62c14d0a0832dda73b7c793ad25268e4fb6d0c8f9c0
-
Filesize
40KB
MD55d6103059981886ee29698ef77006398
SHA102679e8da4f9c86481d4ae1280b31c73d4682eef
SHA256a2bc198ac23bc884dfdfb5d07824f673557d28493f23d7f86cfba498406a7cfa
SHA51256027d02135d1fa1a711507dd8f2985c45f1c71669a388d2363b9dcb88a85aef8fed9bdf8db56db2923fc62c14d0a0832dda73b7c793ad25268e4fb6d0c8f9c0
-
Filesize
40KB
MD55d6103059981886ee29698ef77006398
SHA102679e8da4f9c86481d4ae1280b31c73d4682eef
SHA256a2bc198ac23bc884dfdfb5d07824f673557d28493f23d7f86cfba498406a7cfa
SHA51256027d02135d1fa1a711507dd8f2985c45f1c71669a388d2363b9dcb88a85aef8fed9bdf8db56db2923fc62c14d0a0832dda73b7c793ad25268e4fb6d0c8f9c0
-
Filesize
996B
MD5f0d024be158768932e8e478c36854605
SHA116d4f38921669e3e37cec4b02127b5c4fc57aaf3
SHA256ca468b1cf639aa678574f8c1d89aa63a8ab3b82bab66ff99ff853896f4271fe4
SHA51250aa3840654670296d2785f77dc1993f5e0f681bb607fff54a7ee58439d867b26d4711ffd9816ce61765c4a91033471cd4b938e60802ed887a59b593976361de
-
Filesize
3KB
MD5481eacac626b1ebf2c7bb87684ca68e4
SHA10b5358949f1ed8ee7d36f7eceec1751b7731e0ec
SHA256970e0f1f678e8f82b276d713ad58d2267472e7fb32bf666d35579d949dbf6d01
SHA512c7e827e65049888d6d913ad3c387ff702a6a2840163335f8d8c4b144736cfdb084d3c027ace2adee016c5a2996eef2c55fa016a338691ad9c77d20b2f9a374e2
-
Filesize
16KB
MD525ca20c1d62da229dc135015cef460e4
SHA1e351fcaee513197a89054d432e6747b3ad372baf
SHA256e07774d73ad137ea9d9eeab564d7844baf523cb26459ac2eae5e631403fcec81
SHA51245aa4f3cd9d91ae1ee9968c72dbcd5ab7d448225928af8283d5e04a64867cb5f940b228de6c753fd27124d3ea3e827c46695bcccc7dc9653efe9670844d7c117