Analysis
-
max time kernel
177s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2022 01:45
Behavioral task
behavioral1
Sample
fce657bfcddcdd0b59110e713fd3688ca5e7d4e4efd375d5f780c86412e6a0de.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fce657bfcddcdd0b59110e713fd3688ca5e7d4e4efd375d5f780c86412e6a0de.exe
Resource
win10v2004-20221111-en
General
-
Target
fce657bfcddcdd0b59110e713fd3688ca5e7d4e4efd375d5f780c86412e6a0de.exe
-
Size
894KB
-
MD5
535c08605abd1ad8fccb60413115ec93
-
SHA1
5ff71dab382fbe4e6159baa65ac7b013e5637fae
-
SHA256
fce657bfcddcdd0b59110e713fd3688ca5e7d4e4efd375d5f780c86412e6a0de
-
SHA512
67545f4daea9636fba9825c0b4a94977e59286a0fe8d7786fac92e6810d5a81e34f4f4c6f8fd8729c04ddac881c0fb7d6f48058ee4c02d206450e6959cb9b5da
-
SSDEEP
24576:MyZGrihlF2cBRkppKgcIYfzZCvFohVUwO:MIGOhlNkppKFIYfzZGFw+w
Malware Config
Signatures
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\e0vboai3z8f7iqdcvj7vakejv.exe cryptone C:\Users\Admin\AppData\Local\Temp\e0vboai3z8f7iqdcvj7vakejv.exe cryptone C:\Users\Admin\AppData\Local\bfodhna.exe cryptone C:\Users\Admin\AppData\Local\bfodhna.exe cryptone C:\Users\Admin\AppData\Local\mdvfjceo.exe cryptone C:\Users\Admin\AppData\Local\mdvfjceo.exe cryptone -
Executes dropped EXE 3 IoCs
Processes:
e0vboai3z8f7iqdcvj7vakejv.exebfodhna.exemdvfjceo.exepid process 4592 e0vboai3z8f7iqdcvj7vakejv.exe 5904 bfodhna.exe 2300 mdvfjceo.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
e0vboai3z8f7iqdcvj7vakejv.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bus Gateway Base Publication Collector = "C:\\Users\\Admin\\AppData\\Local\\bfodhna.exe" e0vboai3z8f7iqdcvj7vakejv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
bfodhna.exemdvfjceo.exepid process 5904 bfodhna.exe 5904 bfodhna.exe 2300 mdvfjceo.exe 2300 mdvfjceo.exe 5904 bfodhna.exe 5904 bfodhna.exe 2300 mdvfjceo.exe 2300 mdvfjceo.exe 2300 mdvfjceo.exe 2300 mdvfjceo.exe 2300 mdvfjceo.exe 2300 mdvfjceo.exe 5904 bfodhna.exe 5904 bfodhna.exe 2300 mdvfjceo.exe 2300 mdvfjceo.exe 5904 bfodhna.exe 5904 bfodhna.exe 2300 mdvfjceo.exe 2300 mdvfjceo.exe 5904 bfodhna.exe 5904 bfodhna.exe 2300 mdvfjceo.exe 2300 mdvfjceo.exe 5904 bfodhna.exe 5904 bfodhna.exe 2300 mdvfjceo.exe 2300 mdvfjceo.exe 5904 bfodhna.exe 5904 bfodhna.exe 2300 mdvfjceo.exe 2300 mdvfjceo.exe 5904 bfodhna.exe 5904 bfodhna.exe 2300 mdvfjceo.exe 2300 mdvfjceo.exe 5904 bfodhna.exe 5904 bfodhna.exe 2300 mdvfjceo.exe 2300 mdvfjceo.exe 5904 bfodhna.exe 5904 bfodhna.exe 2300 mdvfjceo.exe 2300 mdvfjceo.exe 5904 bfodhna.exe 5904 bfodhna.exe 2300 mdvfjceo.exe 2300 mdvfjceo.exe 5904 bfodhna.exe 5904 bfodhna.exe 2300 mdvfjceo.exe 2300 mdvfjceo.exe 5904 bfodhna.exe 5904 bfodhna.exe 2300 mdvfjceo.exe 2300 mdvfjceo.exe 5904 bfodhna.exe 5904 bfodhna.exe 2300 mdvfjceo.exe 2300 mdvfjceo.exe 5904 bfodhna.exe 5904 bfodhna.exe 2300 mdvfjceo.exe 2300 mdvfjceo.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
fce657bfcddcdd0b59110e713fd3688ca5e7d4e4efd375d5f780c86412e6a0de.exee0vboai3z8f7iqdcvj7vakejv.exebfodhna.exedescription pid process target process PID 4404 wrote to memory of 4592 4404 fce657bfcddcdd0b59110e713fd3688ca5e7d4e4efd375d5f780c86412e6a0de.exe e0vboai3z8f7iqdcvj7vakejv.exe PID 4404 wrote to memory of 4592 4404 fce657bfcddcdd0b59110e713fd3688ca5e7d4e4efd375d5f780c86412e6a0de.exe e0vboai3z8f7iqdcvj7vakejv.exe PID 4404 wrote to memory of 4592 4404 fce657bfcddcdd0b59110e713fd3688ca5e7d4e4efd375d5f780c86412e6a0de.exe e0vboai3z8f7iqdcvj7vakejv.exe PID 4592 wrote to memory of 5904 4592 e0vboai3z8f7iqdcvj7vakejv.exe bfodhna.exe PID 4592 wrote to memory of 5904 4592 e0vboai3z8f7iqdcvj7vakejv.exe bfodhna.exe PID 4592 wrote to memory of 5904 4592 e0vboai3z8f7iqdcvj7vakejv.exe bfodhna.exe PID 5904 wrote to memory of 2300 5904 bfodhna.exe mdvfjceo.exe PID 5904 wrote to memory of 2300 5904 bfodhna.exe mdvfjceo.exe PID 5904 wrote to memory of 2300 5904 bfodhna.exe mdvfjceo.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fce657bfcddcdd0b59110e713fd3688ca5e7d4e4efd375d5f780c86412e6a0de.exe"C:\Users\Admin\AppData\Local\Temp\fce657bfcddcdd0b59110e713fd3688ca5e7d4e4efd375d5f780c86412e6a0de.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e0vboai3z8f7iqdcvj7vakejv.exe"C:\Users\Admin\AppData\Local\Temp\e0vboai3z8f7iqdcvj7vakejv.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\bfodhna.exe"C:\Users\Admin\AppData\Local\bfodhna.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\mdvfjceo.exeWATCHDOGPROC "c:\users\admin\appdata\local\bfodhna.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\e0vboai3z8f7iqdcvj7vakejv.exeFilesize
894KB
MD5535c08605abd1ad8fccb60413115ec93
SHA15ff71dab382fbe4e6159baa65ac7b013e5637fae
SHA256fce657bfcddcdd0b59110e713fd3688ca5e7d4e4efd375d5f780c86412e6a0de
SHA51267545f4daea9636fba9825c0b4a94977e59286a0fe8d7786fac92e6810d5a81e34f4f4c6f8fd8729c04ddac881c0fb7d6f48058ee4c02d206450e6959cb9b5da
-
C:\Users\Admin\AppData\Local\Temp\e0vboai3z8f7iqdcvj7vakejv.exeFilesize
894KB
MD5535c08605abd1ad8fccb60413115ec93
SHA15ff71dab382fbe4e6159baa65ac7b013e5637fae
SHA256fce657bfcddcdd0b59110e713fd3688ca5e7d4e4efd375d5f780c86412e6a0de
SHA51267545f4daea9636fba9825c0b4a94977e59286a0fe8d7786fac92e6810d5a81e34f4f4c6f8fd8729c04ddac881c0fb7d6f48058ee4c02d206450e6959cb9b5da
-
C:\Users\Admin\AppData\Local\bfodhna.exeFilesize
894KB
MD5535c08605abd1ad8fccb60413115ec93
SHA15ff71dab382fbe4e6159baa65ac7b013e5637fae
SHA256fce657bfcddcdd0b59110e713fd3688ca5e7d4e4efd375d5f780c86412e6a0de
SHA51267545f4daea9636fba9825c0b4a94977e59286a0fe8d7786fac92e6810d5a81e34f4f4c6f8fd8729c04ddac881c0fb7d6f48058ee4c02d206450e6959cb9b5da
-
C:\Users\Admin\AppData\Local\bfodhna.exeFilesize
894KB
MD5535c08605abd1ad8fccb60413115ec93
SHA15ff71dab382fbe4e6159baa65ac7b013e5637fae
SHA256fce657bfcddcdd0b59110e713fd3688ca5e7d4e4efd375d5f780c86412e6a0de
SHA51267545f4daea9636fba9825c0b4a94977e59286a0fe8d7786fac92e6810d5a81e34f4f4c6f8fd8729c04ddac881c0fb7d6f48058ee4c02d206450e6959cb9b5da
-
C:\Users\Admin\AppData\Local\mdvfjceo.exeFilesize
894KB
MD5535c08605abd1ad8fccb60413115ec93
SHA15ff71dab382fbe4e6159baa65ac7b013e5637fae
SHA256fce657bfcddcdd0b59110e713fd3688ca5e7d4e4efd375d5f780c86412e6a0de
SHA51267545f4daea9636fba9825c0b4a94977e59286a0fe8d7786fac92e6810d5a81e34f4f4c6f8fd8729c04ddac881c0fb7d6f48058ee4c02d206450e6959cb9b5da
-
C:\Users\Admin\AppData\Local\mdvfjceo.exeFilesize
894KB
MD5535c08605abd1ad8fccb60413115ec93
SHA15ff71dab382fbe4e6159baa65ac7b013e5637fae
SHA256fce657bfcddcdd0b59110e713fd3688ca5e7d4e4efd375d5f780c86412e6a0de
SHA51267545f4daea9636fba9825c0b4a94977e59286a0fe8d7786fac92e6810d5a81e34f4f4c6f8fd8729c04ddac881c0fb7d6f48058ee4c02d206450e6959cb9b5da
-
C:\Users\Admin\AppData\Local\ptgfukh\etcFilesize
10B
MD5019981d7155717870b8a4bb77e5818fe
SHA103a39922fa816da8edbf8f58c43ea7fb0e961f7d
SHA2564a8bbe987237ea27beea0c6477f82118045564f8b13106076c61252b6c540269
SHA5122652fd42ac5c2374368a81548c9f4276c816ceca3bc094bd24200fc5bd61bbbcb676e497dfa422b1e8252a1a6b35c44d7df44b803149dc03136ec8118bcd435e
-
C:\Users\Admin\AppData\Local\ptgfukh\rngFilesize
4B
MD53bf81e2bf6dc61706efb9a6dadc5793a
SHA1bf1bbfb3b5aaddbc5065b8440ea616d84fad8ff2
SHA256961ae28829f0b1cfbd073eff070ac5ea8994618c0e84fab4764367464a14b854
SHA512354f74cb52f314226a6021c5745799d05a0c8ba21246c9717b8ce211193603c4704b72332f80576d15b14d76c8f772cd5b6fa7a10acb60fab67411573f732b1c
-
C:\Users\Admin\AppData\Local\ptgfukh\tstFilesize
10B
MD5ccd4a74a1cd5422e0be4750ddfc50b18
SHA1d17cae45b7628f369e3c365f4c8fac3e676b0fc4
SHA2569b76d7b5c4e0ebc6dae483584584c0750b1b13617c993d9af525f6b8b5e5b694
SHA512596a93653cdcc976a50c54ae8e2058a0618b7aab9b7abaa596f2d1b2ac1c25deae01149f937bd677c39aa5957abde6d5a3ec8ae0eb7f3a2a95b7686b1497d1a8
-
C:\Users\Admin\AppData\Local\ptgfukh\tstFilesize
10B
MD5ccd4a74a1cd5422e0be4750ddfc50b18
SHA1d17cae45b7628f369e3c365f4c8fac3e676b0fc4
SHA2569b76d7b5c4e0ebc6dae483584584c0750b1b13617c993d9af525f6b8b5e5b694
SHA512596a93653cdcc976a50c54ae8e2058a0618b7aab9b7abaa596f2d1b2ac1c25deae01149f937bd677c39aa5957abde6d5a3ec8ae0eb7f3a2a95b7686b1497d1a8
-
C:\Users\Admin\AppData\Local\ptgfukh\tstFilesize
10B
MD5ccd4a74a1cd5422e0be4750ddfc50b18
SHA1d17cae45b7628f369e3c365f4c8fac3e676b0fc4
SHA2569b76d7b5c4e0ebc6dae483584584c0750b1b13617c993d9af525f6b8b5e5b694
SHA512596a93653cdcc976a50c54ae8e2058a0618b7aab9b7abaa596f2d1b2ac1c25deae01149f937bd677c39aa5957abde6d5a3ec8ae0eb7f3a2a95b7686b1497d1a8
-
memory/2300-141-0x0000000000000000-mapping.dmp
-
memory/4592-132-0x0000000000000000-mapping.dmp
-
memory/5904-136-0x0000000000000000-mapping.dmp