Overview
overview
10Static
static
10unpacme/Bllfgyszs.exe
windows7-x64
10unpacme/Bllfgyszs.exe
windows10-2004-x64
10unpacme/Ne...on.dll
windows7-x64
1unpacme/Ne...on.dll
windows10-2004-x64
1unpacme/Xg...nb.dll
windows7-x64
1unpacme/Xg...nb.dll
windows10-2004-x64
1unpacme/_.dll
windows7-x64
1unpacme/_.dll
windows10-2004-x64
1unpacme/test.exe
windows7-x64
6unpacme/test.exe
windows10-2004-x64
6Analysis
-
max time kernel
108s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2023 00:41
Static task
static1
Behavioral task
behavioral1
Sample
unpacme/Bllfgyszs.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
unpacme/Bllfgyszs.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
unpacme/Newtonsoft.Json.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
unpacme/Newtonsoft.Json.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
unpacme/Xgibxdxqilgiamhhnb.dll
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
unpacme/Xgibxdxqilgiamhhnb.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
unpacme/_.dll
Resource
win7-20220901-en
Behavioral task
behavioral8
Sample
unpacme/_.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
unpacme/test.exe
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
unpacme/test.exe
Resource
win10v2004-20221111-en
General
-
Target
unpacme/Bllfgyszs.exe
-
Size
1.2MB
-
MD5
b4bb8d5ebcafb7cc2681e17e3596649a
-
SHA1
cd7c93d59b53b54e8a3e24e065c9cc93c7101b79
-
SHA256
87e33a27066d4638c3aede2ef053462b8c48395de0dd8fc4087299628ff8e0fa
-
SHA512
9b4edd0cd365ca3d88ba786b258cad7310f8abe5d46dc261edc593fdf4a5a74e05c58d3ff1b7d3b76d10ef9890252d877e6a84212de08ab08018dcf3f06064b3
-
SSDEEP
24576:DBgfiF9Ctf4HCV6eQ3cfDmDjbSZ+/HAjZdMcj6Isc/:Db0tf4e6aDmDfgJbMcD/
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\Hpyjpn\\Ogtnuzcwp.exe\"," Bllfgyszs.exe -
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/memory/4916-132-0x0000000000B70000-0x0000000000CB2000-memory.dmp net_reactor -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation Bllfgyszs.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4916 set thread context of 2132 4916 Bllfgyszs.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4372 powershell.exe 4372 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4916 Bllfgyszs.exe Token: SeDebugPrivilege 4372 powershell.exe Token: SeDebugPrivilege 2132 InstallUtil.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4916 wrote to memory of 4588 4916 Bllfgyszs.exe 81 PID 4916 wrote to memory of 4588 4916 Bllfgyszs.exe 81 PID 4916 wrote to memory of 4588 4916 Bllfgyszs.exe 81 PID 4588 wrote to memory of 4372 4588 cmd.exe 83 PID 4588 wrote to memory of 4372 4588 cmd.exe 83 PID 4588 wrote to memory of 4372 4588 cmd.exe 83 PID 4916 wrote to memory of 2132 4916 Bllfgyszs.exe 86 PID 4916 wrote to memory of 2132 4916 Bllfgyszs.exe 86 PID 4916 wrote to memory of 2132 4916 Bllfgyszs.exe 86 PID 4916 wrote to memory of 2132 4916 Bllfgyszs.exe 86 PID 4916 wrote to memory of 2132 4916 Bllfgyszs.exe 86 PID 4916 wrote to memory of 2132 4916 Bllfgyszs.exe 86 PID 4916 wrote to memory of 2132 4916 Bllfgyszs.exe 86 PID 4916 wrote to memory of 2132 4916 Bllfgyszs.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\unpacme\Bllfgyszs.exe"C:\Users\Admin\AppData\Local\Temp\unpacme\Bllfgyszs.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==2⤵
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4372
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2132
-