Analysis

  • max time kernel
    151s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/11/2022, 16:12

General

  • Target

    ded34d75b0240af24a733795142d50dbc55e170f8cceb32de15ce6b074020743.exe

  • Size

    27KB

  • MD5

    0dd0480764c07b5a1b37891da846f742

  • SHA1

    4973eafff66d8e21a9e4d608a7008f2e08cb42f0

  • SHA256

    ded34d75b0240af24a733795142d50dbc55e170f8cceb32de15ce6b074020743

  • SHA512

    3b253116de19a2af0a8cefb139ce8c526fd46f228e875b6c721fad754f89b703d4d6309e1922382749908c0e4f1f17c347a38b1c6118ffac83e2c82d2d2bc3cd

  • SSDEEP

    384:6H4Gn+N3UPfrdUSNpRPG+gvWqVGsgrjABtajsd63qCZLsKz7QVwbc:VNU3r5LPGlW8gv2cjF3qCZNzcqc

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Sets file execution options in registry 2 TTPs 64 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 12 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ded34d75b0240af24a733795142d50dbc55e170f8cceb32de15ce6b074020743.exe
    "C:\Users\Admin\AppData\Local\Temp\ded34d75b0240af24a733795142d50dbc55e170f8cceb32de15ce6b074020743.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:868
    • C:\Users\Admin\AppData\Local\Temp\ded34d75b0240af24a733795142d50dbc55e170f8cceb32de15ce6b074020743.exe
      C:\Users\Admin\AppData\Local\Temp\ded34d75b0240af24a733795142d50dbc55e170f8cceb32de15ce6b074020743.exe _sys
      2⤵
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4912
      • C:\Windows\system\BoBoTurbo.exe
        C:\Windows\system\BoBoTurbo.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:400
        • C:\Windows\system\BoBoTurbo.exe
          C:\Windows\system\BoBoTurbo.exe _sys
          4⤵
          • Executes dropped EXE
          • Sets file execution options in registry
          • Suspicious use of WriteProcessMemory
          PID:2908
          • C:\Windows\system\BoBoTurbo.exe
            C:\Windows\system\BoBoTurbo.exe down
            5⤵
            • Executes dropped EXE
            PID:4988
          • C:\Windows\system\BoBoTurbo.exe
            C:\Windows\system\BoBoTurbo.exe worm
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops autorun.inf file
            • Drops file in Program Files directory
            PID:4964
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c erase /A:RHSA "C:\Users\Admin\AppData\Local\Temp\ded34d75b0240af24a733795142d50dbc55e170f8cceb32de15ce6b074020743.exe"&cmd /c del "C:\Users\Admin\AppData\Local\Temp\ded34d75b0240af24a733795142d50dbc55e170f8cceb32de15ce6b074020743.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4932
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c del "C:\Users\Admin\AppData\Local\Temp\ded34d75b0240af24a733795142d50dbc55e170f8cceb32de15ce6b074020743.exe"
          4⤵
            PID:1256

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\System\BoBoTurbo.exe

      Filesize

      27KB

      MD5

      0dd0480764c07b5a1b37891da846f742

      SHA1

      4973eafff66d8e21a9e4d608a7008f2e08cb42f0

      SHA256

      ded34d75b0240af24a733795142d50dbc55e170f8cceb32de15ce6b074020743

      SHA512

      3b253116de19a2af0a8cefb139ce8c526fd46f228e875b6c721fad754f89b703d4d6309e1922382749908c0e4f1f17c347a38b1c6118ffac83e2c82d2d2bc3cd

    • C:\Windows\System\BoBoTurbo.exe

      Filesize

      27KB

      MD5

      0dd0480764c07b5a1b37891da846f742

      SHA1

      4973eafff66d8e21a9e4d608a7008f2e08cb42f0

      SHA256

      ded34d75b0240af24a733795142d50dbc55e170f8cceb32de15ce6b074020743

      SHA512

      3b253116de19a2af0a8cefb139ce8c526fd46f228e875b6c721fad754f89b703d4d6309e1922382749908c0e4f1f17c347a38b1c6118ffac83e2c82d2d2bc3cd

    • C:\Windows\System\BoBoTurbo.exe

      Filesize

      27KB

      MD5

      0dd0480764c07b5a1b37891da846f742

      SHA1

      4973eafff66d8e21a9e4d608a7008f2e08cb42f0

      SHA256

      ded34d75b0240af24a733795142d50dbc55e170f8cceb32de15ce6b074020743

      SHA512

      3b253116de19a2af0a8cefb139ce8c526fd46f228e875b6c721fad754f89b703d4d6309e1922382749908c0e4f1f17c347a38b1c6118ffac83e2c82d2d2bc3cd

    • C:\Windows\System\BoBoTurbo.exe

      Filesize

      27KB

      MD5

      0dd0480764c07b5a1b37891da846f742

      SHA1

      4973eafff66d8e21a9e4d608a7008f2e08cb42f0

      SHA256

      ded34d75b0240af24a733795142d50dbc55e170f8cceb32de15ce6b074020743

      SHA512

      3b253116de19a2af0a8cefb139ce8c526fd46f228e875b6c721fad754f89b703d4d6309e1922382749908c0e4f1f17c347a38b1c6118ffac83e2c82d2d2bc3cd

    • C:\Windows\system\BoBoTurbo.exe

      Filesize

      27KB

      MD5

      0dd0480764c07b5a1b37891da846f742

      SHA1

      4973eafff66d8e21a9e4d608a7008f2e08cb42f0

      SHA256

      ded34d75b0240af24a733795142d50dbc55e170f8cceb32de15ce6b074020743

      SHA512

      3b253116de19a2af0a8cefb139ce8c526fd46f228e875b6c721fad754f89b703d4d6309e1922382749908c0e4f1f17c347a38b1c6118ffac83e2c82d2d2bc3cd

    • memory/400-141-0x0000000000800000-0x0000000000825000-memory.dmp

      Filesize

      148KB

    • memory/868-132-0x0000000000800000-0x0000000000825000-memory.dmp

      Filesize

      148KB

    • memory/868-134-0x0000000000800000-0x0000000000825000-memory.dmp

      Filesize

      148KB

    • memory/2908-148-0x0000000000800000-0x0000000000825000-memory.dmp

      Filesize

      148KB

    • memory/4912-135-0x0000000000800000-0x0000000000825000-memory.dmp

      Filesize

      148KB

    • memory/4964-151-0x0000000000800000-0x0000000000825000-memory.dmp

      Filesize

      148KB

    • memory/4964-149-0x0000000000800000-0x0000000000825000-memory.dmp

      Filesize

      148KB

    • memory/4988-147-0x0000000000800000-0x0000000000825000-memory.dmp

      Filesize

      148KB