Analysis

  • max time kernel
    184s
  • max time network
    183s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 17:28

General

  • Target

    c9668c018736474bd3271b602fe5c25e60f46da653f4e19015a21994d0a7dc30.exe

  • Size

    975KB

  • MD5

    8a574488f2b45147a3c7080c10d2cf13

  • SHA1

    35153ec20978ab9effd65b4bd66486b85a4d2ff3

  • SHA256

    c9668c018736474bd3271b602fe5c25e60f46da653f4e19015a21994d0a7dc30

  • SHA512

    f8db90baa5752a1483c6dd5b443720f2fb7e930c5adc62aed4fad702240df51beb26bd6f726fc16980d4ccc4a21dcd667e07fb64d3e1ff99b73d1c3b86784d34

  • SSDEEP

    24576:nbV4dOicN32rh9ewXpCb1rMFj9V7ZDkT9Ef:nbV4dOh32NDZCb1rX9Ef

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 14 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 46 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c9668c018736474bd3271b602fe5c25e60f46da653f4e19015a21994d0a7dc30.exe
    "C:\Users\Admin\AppData\Local\Temp\c9668c018736474bd3271b602fe5c25e60f46da653f4e19015a21994d0a7dc30.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1484
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\bubble-trouble.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\bubble-trouble.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:320
        • C:\Users\Admin\AppData\Local\Temp\Jgl_Rt\bubbletrouble.exe
          "C:\Users\Admin\AppData\Local\Temp\Jgl_Rt\bubbletrouble.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1864
      • C:\Windows\bpk.exe
        C:\Windows\bpk.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Installs/modifies Browser Helper Object
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:680
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x558
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1792

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Jgl_Rt\bubbletrouble.exe

    Filesize

    992KB

    MD5

    9d0d2683a0ddbd5d78d65f1116c115d1

    SHA1

    278f49794c7e81e31d5fbb4a673e76b46be16f61

    SHA256

    297c2bd0f6dda3050d687d37adc30f541cc06107e88a10d997fbc6dc4f0b8069

    SHA512

    2bb3982f46962755c00f0683a6d00837104ef10037ebf56c38aae8ea3a4ac87fd3ebc8117b8d0b9f3363912c04349affe6d07a35ec7429e5540f21b8b1bf9234

  • C:\Users\Admin\AppData\Local\Temp\Jgl_Rt\bubbletrouble.exe

    Filesize

    992KB

    MD5

    9d0d2683a0ddbd5d78d65f1116c115d1

    SHA1

    278f49794c7e81e31d5fbb4a673e76b46be16f61

    SHA256

    297c2bd0f6dda3050d687d37adc30f541cc06107e88a10d997fbc6dc4f0b8069

    SHA512

    2bb3982f46962755c00f0683a6d00837104ef10037ebf56c38aae8ea3a4ac87fd3ebc8117b8d0b9f3363912c04349affe6d07a35ec7429e5540f21b8b1bf9234

  • C:\Users\Admin\AppData\Local\Temp\Jgl_Rt\jesterrun0.dll

    Filesize

    22KB

    MD5

    3c090bac965ee3543728d16b87a4d29f

    SHA1

    859fbb59a7d8468100d20fd120a100d555651438

    SHA256

    e54391a41a9a2807f1f5117a5e2947e9bc2875ae91fa2ac8868d26a3208d7d39

    SHA512

    de351362ee253d63a4eea0f66cb5172bd219c51774e58186add730e6f752b94a7ae0ef4bafc22aa260532410a75bc9c01d7355c3d707168683f3e925d68a2dd8

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\bpk.exe

    Filesize

    376KB

    MD5

    b599c9da5db2d37110b235ebe72b9ca2

    SHA1

    5cf039fadbb42e420bb0418bf95a98f16ee70a8d

    SHA256

    8d9cc7a772af11d16f8d30b6da7b39c0816d1448ed587aa311e3398f6ed0782b

    SHA512

    3de170b7556379bd66237e40f4f3693bfe39315ac3d720af67d37a742a9a2e02e4aa9049f401584d037df632b6b1565dd436d910873d235a8d9e2b67b3d6bfb3

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\bpkhk.dll

    Filesize

    8KB

    MD5

    5b3237d2df1a41a0b133fce3850807d1

    SHA1

    24853d83c89e39051968a349b641bb281768ac12

    SHA256

    d4abb3c0d4b6f1fbae45b84048249de1a25e7e84460d22a665b547769a5d8ac3

    SHA512

    e5275e07c5640ba40779337ccfc52be681b5ef04119d71aa523b7ffe13cf4bbeebf639312bbbea98633fe2ec8c91701a7f9173e455fde5ee84a7e9cc23d547b2

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\bpkwb.dll

    Filesize

    40KB

    MD5

    3787871cf14be1d2dfe5a03eb8ba2618

    SHA1

    38e3410959c6b5f134bc4d3c7fdc2a0a26d53ba6

    SHA256

    7302c29ded118614e5dc022ecdf55b091bb69206fb998dc3e7f409ae1e3abe13

    SHA512

    90c1e5dfa01b8e04797ace5c01551a146839cbc780aeeb85d6eb78c57f1db0fce915dd3bd5a5356cfc3d2f468450bb94b8ff379aaebd3781a94cf28cff5be651

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\bubble-trouble.exe

    Filesize

    832KB

    MD5

    169ff01c7144a0ac8aa3f5a3a976142b

    SHA1

    9229b7a187a163c0a83a9a06643bf85b597f4df6

    SHA256

    09e00bdeb2a2841111cb46c12cbecfa0961933df2b15539849c7249d729c0736

    SHA512

    0410f63ac5350be940a78c03aa07cd91fd68328974a1fde19c9633120743cb286a33768236960db09901578021f687bb646674da7f8967837faaefde22501c06

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\bubble-trouble.exe

    Filesize

    832KB

    MD5

    169ff01c7144a0ac8aa3f5a3a976142b

    SHA1

    9229b7a187a163c0a83a9a06643bf85b597f4df6

    SHA256

    09e00bdeb2a2841111cb46c12cbecfa0961933df2b15539849c7249d729c0736

    SHA512

    0410f63ac5350be940a78c03aa07cd91fd68328974a1fde19c9633120743cb286a33768236960db09901578021f687bb646674da7f8967837faaefde22501c06

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\inst.dat

    Filesize

    732B

    MD5

    b7b43ab0a5c1c5c017f691daf8b05882

    SHA1

    26dd4a15f06d81a52fd0da0f491c97f0a87b637d

    SHA256

    6450eef402c134193f18619d01cc6579085aefd823ebcd98a86a2d24c86564f1

    SHA512

    ce14c54817465f26cad22d18b3be0ea90b987ce9a9cd4416a43a6a0c3bc339a6b18338bb76a41804dc686246fdb81214d929908c8baebc3abe1f7a7eb9eba8dc

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\pk.bin

    Filesize

    3KB

    MD5

    dcad61a9eab14bddf75245ee9428c603

    SHA1

    dd89666b29f8256fb9be7ae46cfe5e9432dbcae4

    SHA256

    8f83f2f5985106fd71f210e6cae7b4120c82a69e09610573498d54fb1a84f3a0

    SHA512

    3ed666a64f0dda9db40e5a04b8aa325961436dbabdb10b08b7a189e5fc6ec8666e956c438d5b52b42c6163022988920f1efa9ecf236fa46461c41518100d114f

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe

    Filesize

    15KB

    MD5

    bd91af2964f7eb5df9c934b27e5f4bef

    SHA1

    82319ef7ae4bf95db66c2580b37e9ed1caa7c511

    SHA256

    529e7c09be84d4724fd043d674615f361a30483bb88f18362ee112362c779c17

    SHA512

    14dfc44ca07c4dd0d3f532e5c421caf46e9ba1226b6b2d0ca39ccb4dc835523376725bdc983899395732dbe94e38837561d136dcd037c4c2cc141a0855c5845f

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe

    Filesize

    15KB

    MD5

    bd91af2964f7eb5df9c934b27e5f4bef

    SHA1

    82319ef7ae4bf95db66c2580b37e9ed1caa7c511

    SHA256

    529e7c09be84d4724fd043d674615f361a30483bb88f18362ee112362c779c17

    SHA512

    14dfc44ca07c4dd0d3f532e5c421caf46e9ba1226b6b2d0ca39ccb4dc835523376725bdc983899395732dbe94e38837561d136dcd037c4c2cc141a0855c5845f

  • C:\Windows\bpk.exe

    Filesize

    376KB

    MD5

    d10233a1135726691711071b3400eebe

    SHA1

    1bbab98ab5b188c7960779b3e997eac18d078718

    SHA256

    b3f0e801e6a20b257cc389b3565293aa8444b49209ee25e99e68c4f67c10b1c5

    SHA512

    6367d39fcaa14cb0efb16e925367ebbeebf2d32fd98148855c018ab308be1d2f5146ab32457d25c04d122311acafc60dda33439fe3fbebbc724e92ffe14f7265

  • C:\Windows\bpkhk.dll

    Filesize

    8KB

    MD5

    00f88388a70c22c385ea39e08bf76bf0

    SHA1

    af08f26cc5049fbb59fc0dce013fa9e6a2acfee1

    SHA256

    e42be3ef45b31e93ccb67115791ad1750ae9d33a3e8a2e6758e73c74ea18847c

    SHA512

    aa08a196529bfe66d9fa7d7a8b993d2eac22a8a99196a0635033d136f0fc02859e8629717e65d2b1bc9ad5646ddb02673c35da5e006780305f239fbcc605fa41

  • C:\Windows\bpkwb.dll

    Filesize

    40KB

    MD5

    e13bed79e41a890c1cd7ad001bfef85b

    SHA1

    2d5067539ebd2963e4feb4706d5d5dc2cafffbdd

    SHA256

    ea710f9260a157c2095a841451b13128ac6e76a5e387eaef179e3dbb618fadb3

    SHA512

    c55447145c66ed9fa23f865d875073d40a7ed3fa5c7923e8f23e648dec3c6a4a40eda2d44d1bbbd73663e314c53c40699477f96543aeaf8e0b579ce2ccedb79d

  • C:\Windows\inst.dat

    Filesize

    732B

    MD5

    b7b43ab0a5c1c5c017f691daf8b05882

    SHA1

    26dd4a15f06d81a52fd0da0f491c97f0a87b637d

    SHA256

    6450eef402c134193f18619d01cc6579085aefd823ebcd98a86a2d24c86564f1

    SHA512

    ce14c54817465f26cad22d18b3be0ea90b987ce9a9cd4416a43a6a0c3bc339a6b18338bb76a41804dc686246fdb81214d929908c8baebc3abe1f7a7eb9eba8dc

  • C:\Windows\pk.bin

    Filesize

    3KB

    MD5

    7d731d5d6456a2f3a07df42bca0a40f5

    SHA1

    38719a1e3adef5ba06928e8c375f7dcc8beb1cb3

    SHA256

    205aadd6a876aa4e9520e4bb95e5d9fe7e78473954dc0c06f6fd5deafade07bb

    SHA512

    6fe6098740b2a82e687b3e047f5a08e2d8a5d2033f7283f498daba8984cfc0d48806109527c35a826c89410aba3532ca1cc569fff42f3256ad3657ef313632bd

  • C:\Windows\rinst.exe

    Filesize

    15KB

    MD5

    bd91af2964f7eb5df9c934b27e5f4bef

    SHA1

    82319ef7ae4bf95db66c2580b37e9ed1caa7c511

    SHA256

    529e7c09be84d4724fd043d674615f361a30483bb88f18362ee112362c779c17

    SHA512

    14dfc44ca07c4dd0d3f532e5c421caf46e9ba1226b6b2d0ca39ccb4dc835523376725bdc983899395732dbe94e38837561d136dcd037c4c2cc141a0855c5845f

  • \Users\Admin\AppData\Local\Temp\Jgl_Rt\bubbletrouble.exe

    Filesize

    992KB

    MD5

    9d0d2683a0ddbd5d78d65f1116c115d1

    SHA1

    278f49794c7e81e31d5fbb4a673e76b46be16f61

    SHA256

    297c2bd0f6dda3050d687d37adc30f541cc06107e88a10d997fbc6dc4f0b8069

    SHA512

    2bb3982f46962755c00f0683a6d00837104ef10037ebf56c38aae8ea3a4ac87fd3ebc8117b8d0b9f3363912c04349affe6d07a35ec7429e5540f21b8b1bf9234

  • \Users\Admin\AppData\Local\Temp\Jgl_Rt\bubbletrouble.exe

    Filesize

    992KB

    MD5

    9d0d2683a0ddbd5d78d65f1116c115d1

    SHA1

    278f49794c7e81e31d5fbb4a673e76b46be16f61

    SHA256

    297c2bd0f6dda3050d687d37adc30f541cc06107e88a10d997fbc6dc4f0b8069

    SHA512

    2bb3982f46962755c00f0683a6d00837104ef10037ebf56c38aae8ea3a4ac87fd3ebc8117b8d0b9f3363912c04349affe6d07a35ec7429e5540f21b8b1bf9234

  • \Users\Admin\AppData\Local\Temp\Jgl_Rt\bubbletrouble.exe

    Filesize

    992KB

    MD5

    9d0d2683a0ddbd5d78d65f1116c115d1

    SHA1

    278f49794c7e81e31d5fbb4a673e76b46be16f61

    SHA256

    297c2bd0f6dda3050d687d37adc30f541cc06107e88a10d997fbc6dc4f0b8069

    SHA512

    2bb3982f46962755c00f0683a6d00837104ef10037ebf56c38aae8ea3a4ac87fd3ebc8117b8d0b9f3363912c04349affe6d07a35ec7429e5540f21b8b1bf9234

  • \Users\Admin\AppData\Local\Temp\Jgl_Rt\bubbletrouble.exe

    Filesize

    992KB

    MD5

    9d0d2683a0ddbd5d78d65f1116c115d1

    SHA1

    278f49794c7e81e31d5fbb4a673e76b46be16f61

    SHA256

    297c2bd0f6dda3050d687d37adc30f541cc06107e88a10d997fbc6dc4f0b8069

    SHA512

    2bb3982f46962755c00f0683a6d00837104ef10037ebf56c38aae8ea3a4ac87fd3ebc8117b8d0b9f3363912c04349affe6d07a35ec7429e5540f21b8b1bf9234

  • \Users\Admin\AppData\Local\Temp\Jgl_Rt\jesterrun0.dll

    Filesize

    22KB

    MD5

    3c090bac965ee3543728d16b87a4d29f

    SHA1

    859fbb59a7d8468100d20fd120a100d555651438

    SHA256

    e54391a41a9a2807f1f5117a5e2947e9bc2875ae91fa2ac8868d26a3208d7d39

    SHA512

    de351362ee253d63a4eea0f66cb5172bd219c51774e58186add730e6f752b94a7ae0ef4bafc22aa260532410a75bc9c01d7355c3d707168683f3e925d68a2dd8

  • \Users\Admin\AppData\Local\Temp\Jgl_Rt\jesterrun0.dll

    Filesize

    22KB

    MD5

    3c090bac965ee3543728d16b87a4d29f

    SHA1

    859fbb59a7d8468100d20fd120a100d555651438

    SHA256

    e54391a41a9a2807f1f5117a5e2947e9bc2875ae91fa2ac8868d26a3208d7d39

    SHA512

    de351362ee253d63a4eea0f66cb5172bd219c51774e58186add730e6f752b94a7ae0ef4bafc22aa260532410a75bc9c01d7355c3d707168683f3e925d68a2dd8

  • \Users\Admin\AppData\Local\Temp\Jgl_Rt\jesterrun0.dll

    Filesize

    22KB

    MD5

    3c090bac965ee3543728d16b87a4d29f

    SHA1

    859fbb59a7d8468100d20fd120a100d555651438

    SHA256

    e54391a41a9a2807f1f5117a5e2947e9bc2875ae91fa2ac8868d26a3208d7d39

    SHA512

    de351362ee253d63a4eea0f66cb5172bd219c51774e58186add730e6f752b94a7ae0ef4bafc22aa260532410a75bc9c01d7355c3d707168683f3e925d68a2dd8

  • \Users\Admin\AppData\Local\Temp\Jgl_Rt\jesterrun0.dll

    Filesize

    22KB

    MD5

    3c090bac965ee3543728d16b87a4d29f

    SHA1

    859fbb59a7d8468100d20fd120a100d555651438

    SHA256

    e54391a41a9a2807f1f5117a5e2947e9bc2875ae91fa2ac8868d26a3208d7d39

    SHA512

    de351362ee253d63a4eea0f66cb5172bd219c51774e58186add730e6f752b94a7ae0ef4bafc22aa260532410a75bc9c01d7355c3d707168683f3e925d68a2dd8

  • \Users\Admin\AppData\Local\Temp\RarSFX0\bubble-trouble.exe

    Filesize

    832KB

    MD5

    169ff01c7144a0ac8aa3f5a3a976142b

    SHA1

    9229b7a187a163c0a83a9a06643bf85b597f4df6

    SHA256

    09e00bdeb2a2841111cb46c12cbecfa0961933df2b15539849c7249d729c0736

    SHA512

    0410f63ac5350be940a78c03aa07cd91fd68328974a1fde19c9633120743cb286a33768236960db09901578021f687bb646674da7f8967837faaefde22501c06

  • \Users\Admin\AppData\Local\Temp\RarSFX0\bubble-trouble.exe

    Filesize

    832KB

    MD5

    169ff01c7144a0ac8aa3f5a3a976142b

    SHA1

    9229b7a187a163c0a83a9a06643bf85b597f4df6

    SHA256

    09e00bdeb2a2841111cb46c12cbecfa0961933df2b15539849c7249d729c0736

    SHA512

    0410f63ac5350be940a78c03aa07cd91fd68328974a1fde19c9633120743cb286a33768236960db09901578021f687bb646674da7f8967837faaefde22501c06

  • \Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe

    Filesize

    15KB

    MD5

    bd91af2964f7eb5df9c934b27e5f4bef

    SHA1

    82319ef7ae4bf95db66c2580b37e9ed1caa7c511

    SHA256

    529e7c09be84d4724fd043d674615f361a30483bb88f18362ee112362c779c17

    SHA512

    14dfc44ca07c4dd0d3f532e5c421caf46e9ba1226b6b2d0ca39ccb4dc835523376725bdc983899395732dbe94e38837561d136dcd037c4c2cc141a0855c5845f

  • \Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe

    Filesize

    15KB

    MD5

    bd91af2964f7eb5df9c934b27e5f4bef

    SHA1

    82319ef7ae4bf95db66c2580b37e9ed1caa7c511

    SHA256

    529e7c09be84d4724fd043d674615f361a30483bb88f18362ee112362c779c17

    SHA512

    14dfc44ca07c4dd0d3f532e5c421caf46e9ba1226b6b2d0ca39ccb4dc835523376725bdc983899395732dbe94e38837561d136dcd037c4c2cc141a0855c5845f

  • \Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe

    Filesize

    15KB

    MD5

    bd91af2964f7eb5df9c934b27e5f4bef

    SHA1

    82319ef7ae4bf95db66c2580b37e9ed1caa7c511

    SHA256

    529e7c09be84d4724fd043d674615f361a30483bb88f18362ee112362c779c17

    SHA512

    14dfc44ca07c4dd0d3f532e5c421caf46e9ba1226b6b2d0ca39ccb4dc835523376725bdc983899395732dbe94e38837561d136dcd037c4c2cc141a0855c5845f

  • \Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe

    Filesize

    15KB

    MD5

    bd91af2964f7eb5df9c934b27e5f4bef

    SHA1

    82319ef7ae4bf95db66c2580b37e9ed1caa7c511

    SHA256

    529e7c09be84d4724fd043d674615f361a30483bb88f18362ee112362c779c17

    SHA512

    14dfc44ca07c4dd0d3f532e5c421caf46e9ba1226b6b2d0ca39ccb4dc835523376725bdc983899395732dbe94e38837561d136dcd037c4c2cc141a0855c5845f

  • memory/2036-54-0x0000000075531000-0x0000000075533000-memory.dmp

    Filesize

    8KB