Analysis

  • max time kernel
    176s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/11/2022, 16:12

General

  • Target

    ded34d75b0240af24a733795142d50dbc55e170f8cceb32de15ce6b074020743.exe

  • Size

    27KB

  • MD5

    0dd0480764c07b5a1b37891da846f742

  • SHA1

    4973eafff66d8e21a9e4d608a7008f2e08cb42f0

  • SHA256

    ded34d75b0240af24a733795142d50dbc55e170f8cceb32de15ce6b074020743

  • SHA512

    3b253116de19a2af0a8cefb139ce8c526fd46f228e875b6c721fad754f89b703d4d6309e1922382749908c0e4f1f17c347a38b1c6118ffac83e2c82d2d2bc3cd

  • SSDEEP

    384:6H4Gn+N3UPfrdUSNpRPG+gvWqVGsgrjABtajsd63qCZLsKz7QVwbc:VNU3r5LPGlW8gv2cjF3qCZNzcqc

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Sets file execution options in registry 2 TTPs 64 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ded34d75b0240af24a733795142d50dbc55e170f8cceb32de15ce6b074020743.exe
    "C:\Users\Admin\AppData\Local\Temp\ded34d75b0240af24a733795142d50dbc55e170f8cceb32de15ce6b074020743.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:948
    • C:\Users\Admin\AppData\Local\Temp\ded34d75b0240af24a733795142d50dbc55e170f8cceb32de15ce6b074020743.exe
      C:\Users\Admin\AppData\Local\Temp\ded34d75b0240af24a733795142d50dbc55e170f8cceb32de15ce6b074020743.exe _sys
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1676
      • C:\Windows\system\BoBoTurbo.exe
        C:\Windows\system\BoBoTurbo.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1252
        • C:\Windows\system\BoBoTurbo.exe
          C:\Windows\system\BoBoTurbo.exe _sys
          4⤵
          • Executes dropped EXE
          • Sets file execution options in registry
          • Suspicious use of WriteProcessMemory
          PID:1684
          • C:\Windows\system\BoBoTurbo.exe
            C:\Windows\system\BoBoTurbo.exe worm
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops autorun.inf file
            • Drops file in Program Files directory
            PID:904
          • C:\Windows\system\BoBoTurbo.exe
            C:\Windows\system\BoBoTurbo.exe down
            5⤵
            • Executes dropped EXE
            PID:1444
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c erase /A:RHSA "C:\Users\Admin\AppData\Local\Temp\ded34d75b0240af24a733795142d50dbc55e170f8cceb32de15ce6b074020743.exe"&cmd /c del "C:\Users\Admin\AppData\Local\Temp\ded34d75b0240af24a733795142d50dbc55e170f8cceb32de15ce6b074020743.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1664
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c del "C:\Users\Admin\AppData\Local\Temp\ded34d75b0240af24a733795142d50dbc55e170f8cceb32de15ce6b074020743.exe"
          4⤵
          • Deletes itself
          PID:1700

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\system\BoBoTurbo.exe

    Filesize

    27KB

    MD5

    0dd0480764c07b5a1b37891da846f742

    SHA1

    4973eafff66d8e21a9e4d608a7008f2e08cb42f0

    SHA256

    ded34d75b0240af24a733795142d50dbc55e170f8cceb32de15ce6b074020743

    SHA512

    3b253116de19a2af0a8cefb139ce8c526fd46f228e875b6c721fad754f89b703d4d6309e1922382749908c0e4f1f17c347a38b1c6118ffac83e2c82d2d2bc3cd

  • C:\Windows\system\BoBoTurbo.exe

    Filesize

    27KB

    MD5

    0dd0480764c07b5a1b37891da846f742

    SHA1

    4973eafff66d8e21a9e4d608a7008f2e08cb42f0

    SHA256

    ded34d75b0240af24a733795142d50dbc55e170f8cceb32de15ce6b074020743

    SHA512

    3b253116de19a2af0a8cefb139ce8c526fd46f228e875b6c721fad754f89b703d4d6309e1922382749908c0e4f1f17c347a38b1c6118ffac83e2c82d2d2bc3cd

  • C:\Windows\system\BoBoTurbo.exe

    Filesize

    27KB

    MD5

    0dd0480764c07b5a1b37891da846f742

    SHA1

    4973eafff66d8e21a9e4d608a7008f2e08cb42f0

    SHA256

    ded34d75b0240af24a733795142d50dbc55e170f8cceb32de15ce6b074020743

    SHA512

    3b253116de19a2af0a8cefb139ce8c526fd46f228e875b6c721fad754f89b703d4d6309e1922382749908c0e4f1f17c347a38b1c6118ffac83e2c82d2d2bc3cd

  • C:\Windows\system\BoBoTurbo.exe

    Filesize

    27KB

    MD5

    0dd0480764c07b5a1b37891da846f742

    SHA1

    4973eafff66d8e21a9e4d608a7008f2e08cb42f0

    SHA256

    ded34d75b0240af24a733795142d50dbc55e170f8cceb32de15ce6b074020743

    SHA512

    3b253116de19a2af0a8cefb139ce8c526fd46f228e875b6c721fad754f89b703d4d6309e1922382749908c0e4f1f17c347a38b1c6118ffac83e2c82d2d2bc3cd

  • C:\Windows\system\BoBoTurbo.exe

    Filesize

    27KB

    MD5

    0dd0480764c07b5a1b37891da846f742

    SHA1

    4973eafff66d8e21a9e4d608a7008f2e08cb42f0

    SHA256

    ded34d75b0240af24a733795142d50dbc55e170f8cceb32de15ce6b074020743

    SHA512

    3b253116de19a2af0a8cefb139ce8c526fd46f228e875b6c721fad754f89b703d4d6309e1922382749908c0e4f1f17c347a38b1c6118ffac83e2c82d2d2bc3cd

  • \Windows\system\BoBoTurbo.exe

    Filesize

    27KB

    MD5

    0dd0480764c07b5a1b37891da846f742

    SHA1

    4973eafff66d8e21a9e4d608a7008f2e08cb42f0

    SHA256

    ded34d75b0240af24a733795142d50dbc55e170f8cceb32de15ce6b074020743

    SHA512

    3b253116de19a2af0a8cefb139ce8c526fd46f228e875b6c721fad754f89b703d4d6309e1922382749908c0e4f1f17c347a38b1c6118ffac83e2c82d2d2bc3cd

  • \Windows\system\BoBoTurbo.exe

    Filesize

    27KB

    MD5

    0dd0480764c07b5a1b37891da846f742

    SHA1

    4973eafff66d8e21a9e4d608a7008f2e08cb42f0

    SHA256

    ded34d75b0240af24a733795142d50dbc55e170f8cceb32de15ce6b074020743

    SHA512

    3b253116de19a2af0a8cefb139ce8c526fd46f228e875b6c721fad754f89b703d4d6309e1922382749908c0e4f1f17c347a38b1c6118ffac83e2c82d2d2bc3cd

  • memory/904-75-0x0000000000800000-0x0000000000825000-memory.dmp

    Filesize

    148KB

  • memory/904-74-0x0000000000800000-0x0000000000825000-memory.dmp

    Filesize

    148KB

  • memory/948-55-0x0000000000800000-0x0000000000825000-memory.dmp

    Filesize

    148KB

  • memory/1252-63-0x0000000000800000-0x0000000000825000-memory.dmp

    Filesize

    148KB

  • memory/1444-68-0x0000000076041000-0x0000000076043000-memory.dmp

    Filesize

    8KB

  • memory/1444-72-0x0000000000800000-0x0000000000825000-memory.dmp

    Filesize

    148KB

  • memory/1676-70-0x0000000000800000-0x0000000000825000-memory.dmp

    Filesize

    148KB

  • memory/1684-73-0x0000000000800000-0x0000000000825000-memory.dmp

    Filesize

    148KB