Analysis
-
max time kernel
23s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 08:38
Static task
static1
Behavioral task
behavioral1
Sample
bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179.exe
Resource
win10v2004-20220812-en
General
-
Target
bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179.exe
-
Size
204KB
-
MD5
afdb49e7d001c9da644c41f962d55bf4
-
SHA1
7c1e40cc002d44b9b007b96684b190b03522e3b2
-
SHA256
bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179
-
SHA512
234a2ffe90e33bc78dd9a219a725d2d0d586200c6d1d45399f91ee80673e7361a04f96caeabde6cc3b680b0e7934589c66911a440aa0eb6a50a2235037155df8
-
SSDEEP
6144:QBmcgGlfktsafF0isD2JGlyRrUXPei+m:wgGOtf90isaAQRqPn
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\liveMail32 = "C:\\Windows\\system32\\bbdt7851.exe" bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\ bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\bbdt2511.ocx bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\bbdt5818.dll bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Box32.clsBox32\Clsid bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Box32.clsBox32 bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1988 bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179.exe 1988 bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179.exe 1988 bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179.exe 1988 bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179.exe 1988 bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179.exe 1988 bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179.exe 1988 bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179.exe 1988 bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179.exe 1988 bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1988 bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1988 wrote to memory of 1136 1988 bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179.exe 28 PID 1988 wrote to memory of 1136 1988 bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179.exe 28 PID 1988 wrote to memory of 1136 1988 bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179.exe 28 PID 1988 wrote to memory of 1136 1988 bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179.exe 28 PID 1988 wrote to memory of 1136 1988 bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179.exe 28 PID 1988 wrote to memory of 1136 1988 bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179.exe 28 PID 1988 wrote to memory of 1136 1988 bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179.exe 28 PID 1988 wrote to memory of 432 1988 bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179.exe 30 PID 1988 wrote to memory of 432 1988 bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179.exe 30 PID 1988 wrote to memory of 432 1988 bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179.exe 30 PID 1988 wrote to memory of 432 1988 bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179.exe 30 PID 1988 wrote to memory of 432 1988 bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179.exe 30 PID 1988 wrote to memory of 432 1988 bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179.exe 30 PID 1988 wrote to memory of 432 1988 bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179.exe"C:\Users\Admin\AppData\Local\Temp\bf8814197ecf17a0edc0349da6a04840826138d69e490b4c40c4cc1837a8e179.exe"1⤵
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\bbdt2511.ocx2⤵PID:1136
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\bbdt5818.dll2⤵PID:432
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9B
MD5d8f4a1993546cc4b850cde3599e27aec
SHA1094b763b4cfcc0b05e5d040581cd513c3ca08067
SHA256907ba78b4545338d3539683e63ecb51cf51c10adc9dabd86e92bd52339f298b9
SHA5127c696247f98aa6fe4e1df001fd6029abbbccf45b122d65dfdede8f8a400cda775387c657f96bd1e4e52da7409187892b1f0786c54d835d2e44227b2e1335eaf6
-
Filesize
9B
MD5d8f4a1993546cc4b850cde3599e27aec
SHA1094b763b4cfcc0b05e5d040581cd513c3ca08067
SHA256907ba78b4545338d3539683e63ecb51cf51c10adc9dabd86e92bd52339f298b9
SHA5127c696247f98aa6fe4e1df001fd6029abbbccf45b122d65dfdede8f8a400cda775387c657f96bd1e4e52da7409187892b1f0786c54d835d2e44227b2e1335eaf6