Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23-11-2022 13:45

General

  • Target

    https://linkvertise.download/download/441781/bloxburg-anti-ban/1Li5DkMVMagPEXZSGE0xw1XtXIeSwqc0

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Windows directory 3 IoCs
  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Mozilla Firefox\firefox.exe
    "C:\Program Files\Mozilla Firefox\firefox.exe" https://linkvertise.download/download/441781/bloxburg-anti-ban/1Li5DkMVMagPEXZSGE0xw1XtXIeSwqc0
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe" https://linkvertise.download/download/441781/bloxburg-anti-ban/1Li5DkMVMagPEXZSGE0xw1XtXIeSwqc0
      2⤵
      • Checks processor information in registry
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2636
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2636.0.177550382\875658992" -parentBuildID 20200403170909 -prefsHandle 1556 -prefMapHandle 1548 -prefsLen 1 -prefMapSize 219987 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2636 "\\.\pipe\gecko-crash-server-pipe.2636" 1648 gpu
        3⤵
          PID:3352
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2636.3.10087844\1856445923" -childID 1 -isForBrowser -prefsHandle 2208 -prefMapHandle 2160 -prefsLen 156 -prefMapSize 219987 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2636 "\\.\pipe\gecko-crash-server-pipe.2636" 2236 tab
          3⤵
            PID:3772
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2636.13.573689985\110541679" -childID 2 -isForBrowser -prefsHandle 3432 -prefMapHandle 3428 -prefsLen 6938 -prefMapSize 219987 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2636 "\\.\pipe\gecko-crash-server-pipe.2636" 3364 tab
            3⤵
              PID:1980
        • C:\Users\Admin\Downloads\Bloxburg Anti Ban - Linkvertise Downloader_LIYN-g1.exe
          "C:\Users\Admin\Downloads\Bloxburg Anti Ban - Linkvertise Downloader_LIYN-g1.exe"
          1⤵
          • Executes dropped EXE
          PID:2708
          • C:\Users\Admin\AppData\Local\Temp\is-0SG53.tmp\Bloxburg Anti Ban - Linkvertise Downloader_LIYN-g1.tmp
            "C:\Users\Admin\AppData\Local\Temp\is-0SG53.tmp\Bloxburg Anti Ban - Linkvertise Downloader_LIYN-g1.tmp" /SL5="$20202,3477953,1235968,C:\Users\Admin\Downloads\Bloxburg Anti Ban - Linkvertise Downloader_LIYN-g1.exe"
            2⤵
            • Executes dropped EXE
            • Checks computer location settings
            • Loads dropped DLL
            • Checks processor information in registry
            • Suspicious use of FindShellTrayWindow
            PID:216
        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
          1⤵
          • Drops file in Windows directory
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:4900
        • C:\Windows\system32\browser_broker.exe
          C:\Windows\system32\browser_broker.exe -Embedding
          1⤵
          • Modifies Internet Explorer settings
          PID:2248
        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
          1⤵
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of SetWindowsHookEx
          PID:2272
        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
          1⤵
          • Drops file in Windows directory
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          PID:1380
        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
          1⤵
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          PID:3588
        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
          1⤵
            PID:4872
          • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
            "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
            1⤵
            • Modifies registry class
            PID:208

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\is-0SG53.tmp\Bloxburg Anti Ban - Linkvertise Downloader_LIYN-g1.tmp

            Filesize

            3.4MB

            MD5

            f435c75c8830be8274975b739ba39a0f

            SHA1

            cd503c4c40d0b0bfd3a4845be69567c5fa4df452

            SHA256

            e9a4ff16a32deb5f3ed4e0991688f4dec2d24211061746bac93ba3bfc25ab444

            SHA512

            0f08497afd8551fd9318fb14cfb1a20d3b2406cab5ca5415825aa63373ecc648918eacbebd0bb0032c1d35718124a3bdcbf20625ed98d84006427fcec202561a

          • C:\Users\Admin\Downloads\Bloxburg Anti Ban - Linkvertise Downloader_LIYN-g1.exe

            Filesize

            4.3MB

            MD5

            5a2a856c4a3181b29bdea027bf6c9d92

            SHA1

            4ea985802189706059aef2ca4e061001ba291455

            SHA256

            baa91b32c0bfa7f51adeb316df6f74e4f430a44592f03356dd01d09efd74342d

            SHA512

            9329cf0eb96c164fbe01d264033666ef0fc3212804b6ecd376aa342d345c1ba81fb3cd7401d47a40dd1bfaf718a62e2cce4464f4547eeb0a2730f02f967d8a7c

          • C:\Users\Admin\Downloads\Bloxburg Anti Ban - Linkvertise Downloader_LIYN-g1.exe

            Filesize

            4.3MB

            MD5

            5a2a856c4a3181b29bdea027bf6c9d92

            SHA1

            4ea985802189706059aef2ca4e061001ba291455

            SHA256

            baa91b32c0bfa7f51adeb316df6f74e4f430a44592f03356dd01d09efd74342d

            SHA512

            9329cf0eb96c164fbe01d264033666ef0fc3212804b6ecd376aa342d345c1ba81fb3cd7401d47a40dd1bfaf718a62e2cce4464f4547eeb0a2730f02f967d8a7c

          • \??\pipe\chrome.2636.10.138576385

            Filesize

            304B

            MD5

            1b5e57954e7583c5dc24b4982a587e46

            SHA1

            06b75ef78518405bf22639df608fcc2e77d13fba

            SHA256

            6ac119cd7adfc416ce00854187879f488db5b146fedf8eae6a95202d1dceac64

            SHA512

            fd52efd0153f3a5efbf4a54fa0e6e0796ffbe863c9a6c38b0367aec983c7100c464fce2ad49d6c1c44e648ff5a52a415cf5f9200ba9121dc175d90d715c2a053

          • \Users\Admin\AppData\Local\Temp\is-21S3B.tmp\AppUtils.dll

            Filesize

            1.8MB

            MD5

            61313107f86efd528d5e0b15fcc8b8c7

            SHA1

            4de55bee0decf620de12ee49d8d94d6796d59721

            SHA256

            99c01c23b88ab7e656ccb05200fec3c12779de7e20fa20aaea034e7a12fc90ef

            SHA512

            7fcd8fde1ead2ee6e879240f55f3ff4db17e7f716c3fc7f28da1464ed4a1760568427584fe34cfea945c64ab9a8db7b8d50e80e3bc27b8c2c1103aa6846a9dc2

          • \Users\Admin\AppData\Local\Temp\is-21S3B.tmp\DimensionUtils.dll

            Filesize

            1.9MB

            MD5

            21da787bf4014ee28ba649bc0335f012

            SHA1

            9ae7f559a3f925e533f1526722118bb16672ee28

            SHA256

            9f5e08b5309fde308dc9786e98e90cb3661fc06ac8dfdfbfa550b5e62b083564

            SHA512

            0b44ca41123d4cd94acb192e2865e4e7bfc4c0c80722efb59c40675f76eb06e042d889fb2a01caa0f371abce69c387ffe4e50b9d6fa16c25ef03f20989c3c3a5

          • \Users\Admin\AppData\Local\Temp\is-21S3B.tmp\botva2.dll

            Filesize

            37KB

            MD5

            67965a5957a61867d661f05ae1f4773e

            SHA1

            f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

            SHA256

            450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

            SHA512

            c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

          • \Users\Admin\AppData\Local\Temp\is-21S3B.tmp\botva2.dll

            Filesize

            37KB

            MD5

            67965a5957a61867d661f05ae1f4773e

            SHA1

            f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

            SHA256

            450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

            SHA512

            c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

          • memory/216-178-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/216-174-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/216-184-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/216-183-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/216-182-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/216-181-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/216-180-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/216-179-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/216-186-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/216-177-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/216-187-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/216-176-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/216-175-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/216-185-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/216-173-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/216-172-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/216-171-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/216-170-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/216-169-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/216-168-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/216-167-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/216-166-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/216-165-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/216-164-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/216-188-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/216-162-0x0000000000000000-mapping.dmp

          • memory/2708-138-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-141-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-153-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-158-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-159-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-160-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-161-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-154-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-152-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-151-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-150-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-149-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-148-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-147-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-146-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-145-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-144-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-143-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-142-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-155-0x0000000000400000-0x000000000053B000-memory.dmp

            Filesize

            1.2MB

          • memory/2708-140-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-139-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-137-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-136-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-135-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-134-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-133-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-132-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-131-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-129-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-130-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-128-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-127-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-126-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-125-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-248-0x0000000000400000-0x000000000053B000-memory.dmp

            Filesize

            1.2MB

          • memory/2708-124-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-123-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-122-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-304-0x0000000000400000-0x000000000053B000-memory.dmp

            Filesize

            1.2MB