Resubmissions
22-09-2022 08:48
220922-kqfr4seebl 9Analysis
-
max time kernel
43s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
submitted
22-09-2022 08:48
Static task
static1
Behavioral task
behavioral1
Sample
a4b20aac859ff8939885a98aa746e658.exe
Resource
win7-20220901-en
General
-
Target
a4b20aac859ff8939885a98aa746e658.exe
-
Size
2.5MB
-
MD5
a4b20aac859ff8939885a98aa746e658
-
SHA1
112fefcc64e58fec53d7b6eb04392d5049d2ff7b
-
SHA256
5e9de6cd9ab8d1b6255115d2afc575bb4865d18b75cbaead7cbe2efdf503f227
-
SHA512
d9eed217a9347736e7ee1232f3feace9776d9d3381c0d673eab21583e1e74e3da4cc298789b4c6c6e249bf4ae5e2858f4328fbb5c189f04945e2660dd1eeacd6
-
SSDEEP
24576:nIU9EVQdddvAjGPJXdJ/XQQIEiQaja0APtD5iQnxUXp+3pZAiAISXVmJkTxu9pks:sG2Qn7AiOAx+jtAX
Malware Config
Extracted
cryptbot
http://dixevd32.top/gate.php
-
payload_url
http://lueyob04.top/bhadon.dat
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
DpEditor.exebhadon.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ DpEditor.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bhadon.exe -
Executes dropped EXE 2 IoCs
Processes:
bhadon.exeDpEditor.exepid Process 1324 bhadon.exe 1248 DpEditor.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
bhadon.exeDpEditor.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bhadon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bhadon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DpEditor.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DpEditor.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 748 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exebhadon.exepid Process 1784 cmd.exe 1324 bhadon.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/files/0x00090000000142c8-62.dat themida behavioral1/files/0x00090000000142c8-60.dat themida behavioral1/files/0x00090000000142c8-59.dat themida behavioral1/memory/1324-65-0x00000000001F0000-0x00000000008EF000-memory.dmp themida behavioral1/memory/1324-66-0x00000000001F0000-0x00000000008EF000-memory.dmp themida behavioral1/memory/1324-67-0x00000000001F0000-0x00000000008EF000-memory.dmp themida behavioral1/memory/1324-68-0x00000000001F0000-0x00000000008EF000-memory.dmp themida behavioral1/memory/1324-70-0x00000000001F0000-0x00000000008EF000-memory.dmp themida behavioral1/files/0x000700000001468b-72.dat themida behavioral1/files/0x000700000001468b-74.dat themida behavioral1/memory/1324-76-0x00000000001F0000-0x00000000008EF000-memory.dmp themida behavioral1/memory/1248-78-0x0000000000C40000-0x000000000133F000-memory.dmp themida behavioral1/memory/1248-79-0x0000000000C40000-0x000000000133F000-memory.dmp themida behavioral1/memory/1248-80-0x0000000000C40000-0x000000000133F000-memory.dmp themida behavioral1/memory/1248-81-0x0000000000C40000-0x000000000133F000-memory.dmp themida behavioral1/memory/1248-82-0x0000000000C40000-0x000000000133F000-memory.dmp themida behavioral1/memory/1248-83-0x0000000000C40000-0x000000000133F000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
DpEditor.exebhadon.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DpEditor.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bhadon.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
a4b20aac859ff8939885a98aa746e658.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum a4b20aac859ff8939885a98aa746e658.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\ProductId a4b20aac859ff8939885a98aa746e658.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
bhadon.exeDpEditor.exepid Process 1324 bhadon.exe 1248 DpEditor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
a4b20aac859ff8939885a98aa746e658.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString a4b20aac859ff8939885a98aa746e658.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz a4b20aac859ff8939885a98aa746e658.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 a4b20aac859ff8939885a98aa746e658.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid Process 1344 timeout.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
DpEditor.exepid Process 1248 DpEditor.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
a4b20aac859ff8939885a98aa746e658.exebhadon.exeDpEditor.exepid Process 1672 a4b20aac859ff8939885a98aa746e658.exe 1324 bhadon.exe 1248 DpEditor.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
a4b20aac859ff8939885a98aa746e658.execmd.execmd.exebhadon.exedescription pid Process procid_target PID 1672 wrote to memory of 1784 1672 a4b20aac859ff8939885a98aa746e658.exe 28 PID 1672 wrote to memory of 1784 1672 a4b20aac859ff8939885a98aa746e658.exe 28 PID 1672 wrote to memory of 1784 1672 a4b20aac859ff8939885a98aa746e658.exe 28 PID 1672 wrote to memory of 1784 1672 a4b20aac859ff8939885a98aa746e658.exe 28 PID 1672 wrote to memory of 748 1672 a4b20aac859ff8939885a98aa746e658.exe 30 PID 1672 wrote to memory of 748 1672 a4b20aac859ff8939885a98aa746e658.exe 30 PID 1672 wrote to memory of 748 1672 a4b20aac859ff8939885a98aa746e658.exe 30 PID 1672 wrote to memory of 748 1672 a4b20aac859ff8939885a98aa746e658.exe 30 PID 1784 wrote to memory of 1324 1784 cmd.exe 33 PID 1784 wrote to memory of 1324 1784 cmd.exe 33 PID 1784 wrote to memory of 1324 1784 cmd.exe 33 PID 1784 wrote to memory of 1324 1784 cmd.exe 33 PID 748 wrote to memory of 1344 748 cmd.exe 32 PID 748 wrote to memory of 1344 748 cmd.exe 32 PID 748 wrote to memory of 1344 748 cmd.exe 32 PID 748 wrote to memory of 1344 748 cmd.exe 32 PID 1324 wrote to memory of 1248 1324 bhadon.exe 34 PID 1324 wrote to memory of 1248 1324 bhadon.exe 34 PID 1324 wrote to memory of 1248 1324 bhadon.exe 34 PID 1324 wrote to memory of 1248 1324 bhadon.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4b20aac859ff8939885a98aa746e658.exe"C:\Users\Admin\AppData\Local\Temp\a4b20aac859ff8939885a98aa746e658.exe"1⤵
- Maps connected drives based on registry
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Roaming\47AA605425729FF0\bhadon.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Roaming\47AA605425729FF0\bhadon.exeC:\Users\Admin\AppData\Roaming\47AA605425729FF0\bhadon.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe"C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
PID:1248
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout -t 5 && del "C:\Users\Admin\AppData\Local\Temp\a4b20aac859ff8939885a98aa746e658.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\timeout.exetimeout -t 53⤵
- Delays execution with timeout.exe
PID:1344
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5ebced6b6e601edf55f145a9878a1c880
SHA1dc2f29d88b5da8e4249d37c16881806e084dc06a
SHA256a9c914999382656cc7d90890605b1df37aa36000a34e20a69b59d491a797ecbd
SHA512a5a69358910f4673b0eb76b9ec11d255be6c485549a7631f951a5a432e8c08573da588654eb40a99b2cc9b6b1b18f9c8a76322727738dc39d160d1f12d1b7ea5
-
Filesize
2.7MB
MD5ebced6b6e601edf55f145a9878a1c880
SHA1dc2f29d88b5da8e4249d37c16881806e084dc06a
SHA256a9c914999382656cc7d90890605b1df37aa36000a34e20a69b59d491a797ecbd
SHA512a5a69358910f4673b0eb76b9ec11d255be6c485549a7631f951a5a432e8c08573da588654eb40a99b2cc9b6b1b18f9c8a76322727738dc39d160d1f12d1b7ea5
-
Filesize
2.7MB
MD5ebced6b6e601edf55f145a9878a1c880
SHA1dc2f29d88b5da8e4249d37c16881806e084dc06a
SHA256a9c914999382656cc7d90890605b1df37aa36000a34e20a69b59d491a797ecbd
SHA512a5a69358910f4673b0eb76b9ec11d255be6c485549a7631f951a5a432e8c08573da588654eb40a99b2cc9b6b1b18f9c8a76322727738dc39d160d1f12d1b7ea5
-
Filesize
2.7MB
MD5ebced6b6e601edf55f145a9878a1c880
SHA1dc2f29d88b5da8e4249d37c16881806e084dc06a
SHA256a9c914999382656cc7d90890605b1df37aa36000a34e20a69b59d491a797ecbd
SHA512a5a69358910f4673b0eb76b9ec11d255be6c485549a7631f951a5a432e8c08573da588654eb40a99b2cc9b6b1b18f9c8a76322727738dc39d160d1f12d1b7ea5
-
Filesize
2.7MB
MD5ebced6b6e601edf55f145a9878a1c880
SHA1dc2f29d88b5da8e4249d37c16881806e084dc06a
SHA256a9c914999382656cc7d90890605b1df37aa36000a34e20a69b59d491a797ecbd
SHA512a5a69358910f4673b0eb76b9ec11d255be6c485549a7631f951a5a432e8c08573da588654eb40a99b2cc9b6b1b18f9c8a76322727738dc39d160d1f12d1b7ea5