Resubmissions
22-09-2022 08:48
220922-kqfr4seebl 9Analysis
-
max time kernel
69s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
submitted
22-09-2022 08:48
Static task
static1
Behavioral task
behavioral1
Sample
a4b20aac859ff8939885a98aa746e658.exe
Resource
win7-20220901-en
General
-
Target
a4b20aac859ff8939885a98aa746e658.exe
-
Size
2.5MB
-
MD5
a4b20aac859ff8939885a98aa746e658
-
SHA1
112fefcc64e58fec53d7b6eb04392d5049d2ff7b
-
SHA256
5e9de6cd9ab8d1b6255115d2afc575bb4865d18b75cbaead7cbe2efdf503f227
-
SHA512
d9eed217a9347736e7ee1232f3feace9776d9d3381c0d673eab21583e1e74e3da4cc298789b4c6c6e249bf4ae5e2858f4328fbb5c189f04945e2660dd1eeacd6
-
SSDEEP
24576:nIU9EVQdddvAjGPJXdJ/XQQIEiQaja0APtD5iQnxUXp+3pZAiAISXVmJkTxu9pks:sG2Qn7AiOAx+jtAX
Malware Config
Extracted
cryptbot
http://dixevd32.top/gate.php
-
payload_url
http://lueyob04.top/bhadon.dat
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
bhadon.exeDpEditor.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bhadon.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ DpEditor.exe -
Executes dropped EXE 2 IoCs
Processes:
bhadon.exeDpEditor.exepid Process 1924 bhadon.exe 412 DpEditor.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
bhadon.exeDpEditor.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bhadon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DpEditor.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DpEditor.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bhadon.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
a4b20aac859ff8939885a98aa746e658.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a4b20aac859ff8939885a98aa746e658.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/files/0x0007000000022e22-138.dat themida behavioral2/files/0x0007000000022e22-139.dat themida behavioral2/memory/1924-140-0x0000000000880000-0x0000000000F7F000-memory.dmp themida behavioral2/memory/1924-141-0x0000000000880000-0x0000000000F7F000-memory.dmp themida behavioral2/memory/1924-142-0x0000000000880000-0x0000000000F7F000-memory.dmp themida behavioral2/memory/1924-143-0x0000000000880000-0x0000000000F7F000-memory.dmp themida behavioral2/memory/1924-144-0x0000000000880000-0x0000000000F7F000-memory.dmp themida behavioral2/files/0x0007000000022e42-148.dat themida behavioral2/memory/1924-149-0x0000000000880000-0x0000000000F7F000-memory.dmp themida behavioral2/files/0x0007000000022e42-147.dat themida behavioral2/memory/412-151-0x0000000000B20000-0x000000000121F000-memory.dmp themida behavioral2/memory/412-152-0x0000000000B20000-0x000000000121F000-memory.dmp themida behavioral2/memory/412-153-0x0000000000B20000-0x000000000121F000-memory.dmp themida behavioral2/memory/412-154-0x0000000000B20000-0x000000000121F000-memory.dmp themida behavioral2/memory/412-156-0x0000000000B20000-0x000000000121F000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
bhadon.exeDpEditor.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bhadon.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DpEditor.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
a4b20aac859ff8939885a98aa746e658.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum a4b20aac859ff8939885a98aa746e658.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\ProductId a4b20aac859ff8939885a98aa746e658.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
bhadon.exeDpEditor.exepid Process 1924 bhadon.exe 412 DpEditor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
a4b20aac859ff8939885a98aa746e658.exedescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 a4b20aac859ff8939885a98aa746e658.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString a4b20aac859ff8939885a98aa746e658.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz a4b20aac859ff8939885a98aa746e658.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid Process 4440 timeout.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
DpEditor.exepid Process 412 DpEditor.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
a4b20aac859ff8939885a98aa746e658.exebhadon.exeDpEditor.exepid Process 4800 a4b20aac859ff8939885a98aa746e658.exe 4800 a4b20aac859ff8939885a98aa746e658.exe 1924 bhadon.exe 1924 bhadon.exe 412 DpEditor.exe 412 DpEditor.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
a4b20aac859ff8939885a98aa746e658.execmd.execmd.exebhadon.exedescription pid Process procid_target PID 4800 wrote to memory of 2248 4800 a4b20aac859ff8939885a98aa746e658.exe 86 PID 4800 wrote to memory of 2248 4800 a4b20aac859ff8939885a98aa746e658.exe 86 PID 4800 wrote to memory of 2248 4800 a4b20aac859ff8939885a98aa746e658.exe 86 PID 4800 wrote to memory of 4216 4800 a4b20aac859ff8939885a98aa746e658.exe 88 PID 4800 wrote to memory of 4216 4800 a4b20aac859ff8939885a98aa746e658.exe 88 PID 4800 wrote to memory of 4216 4800 a4b20aac859ff8939885a98aa746e658.exe 88 PID 4216 wrote to memory of 4440 4216 cmd.exe 90 PID 4216 wrote to memory of 4440 4216 cmd.exe 90 PID 4216 wrote to memory of 4440 4216 cmd.exe 90 PID 2248 wrote to memory of 1924 2248 cmd.exe 91 PID 2248 wrote to memory of 1924 2248 cmd.exe 91 PID 2248 wrote to memory of 1924 2248 cmd.exe 91 PID 1924 wrote to memory of 412 1924 bhadon.exe 95 PID 1924 wrote to memory of 412 1924 bhadon.exe 95 PID 1924 wrote to memory of 412 1924 bhadon.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4b20aac859ff8939885a98aa746e658.exe"C:\Users\Admin\AppData\Local\Temp\a4b20aac859ff8939885a98aa746e658.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Roaming\2A550C546BDAE80F\bhadon.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Roaming\2A550C546BDAE80F\bhadon.exeC:\Users\Admin\AppData\Roaming\2A550C546BDAE80F\bhadon.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe"C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
PID:412
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout -t 5 && del "C:\Users\Admin\AppData\Local\Temp\a4b20aac859ff8939885a98aa746e658.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Windows\SysWOW64\timeout.exetimeout -t 53⤵
- Delays execution with timeout.exe
PID:4440
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5ebced6b6e601edf55f145a9878a1c880
SHA1dc2f29d88b5da8e4249d37c16881806e084dc06a
SHA256a9c914999382656cc7d90890605b1df37aa36000a34e20a69b59d491a797ecbd
SHA512a5a69358910f4673b0eb76b9ec11d255be6c485549a7631f951a5a432e8c08573da588654eb40a99b2cc9b6b1b18f9c8a76322727738dc39d160d1f12d1b7ea5
-
Filesize
2.7MB
MD5ebced6b6e601edf55f145a9878a1c880
SHA1dc2f29d88b5da8e4249d37c16881806e084dc06a
SHA256a9c914999382656cc7d90890605b1df37aa36000a34e20a69b59d491a797ecbd
SHA512a5a69358910f4673b0eb76b9ec11d255be6c485549a7631f951a5a432e8c08573da588654eb40a99b2cc9b6b1b18f9c8a76322727738dc39d160d1f12d1b7ea5
-
Filesize
2.7MB
MD5ebced6b6e601edf55f145a9878a1c880
SHA1dc2f29d88b5da8e4249d37c16881806e084dc06a
SHA256a9c914999382656cc7d90890605b1df37aa36000a34e20a69b59d491a797ecbd
SHA512a5a69358910f4673b0eb76b9ec11d255be6c485549a7631f951a5a432e8c08573da588654eb40a99b2cc9b6b1b18f9c8a76322727738dc39d160d1f12d1b7ea5
-
Filesize
2.7MB
MD5ebced6b6e601edf55f145a9878a1c880
SHA1dc2f29d88b5da8e4249d37c16881806e084dc06a
SHA256a9c914999382656cc7d90890605b1df37aa36000a34e20a69b59d491a797ecbd
SHA512a5a69358910f4673b0eb76b9ec11d255be6c485549a7631f951a5a432e8c08573da588654eb40a99b2cc9b6b1b18f9c8a76322727738dc39d160d1f12d1b7ea5