Analysis
-
max time kernel
280s -
max time network
302s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
16-03-2023 12:52
Static task
static1
Behavioral task
behavioral1
Sample
Bpznb.msi
Resource
win7-20230220-en
General
-
Target
Bpznb.msi
-
Size
3.8MB
-
MD5
c39fec313f716b37b80ccf946ef5cc83
-
SHA1
7af29257d77bab7ed5a70293abe44da3c1c10c37
-
SHA256
015151bd2d2bfb88389899bfac44b0e17a28db00abc8e1463058d84de40b1925
-
SHA512
0eeb8fa73bbf1886101db96ea376343fae6bae872a264b55feb58a1060c75772f45b5244b005613830e056cd7a58f8307bb54c01417cacd7a57d46542b160291
-
SSDEEP
49152:LpUPlOPlQRNDP9nqI5KKs2p8iYu9ap7QqKHKG+n2H6h1Ug:LpTt4NDVPKB2vinG8n2Hs
Malware Config
Extracted
stealc
http://193.233.20.145
Extracted
laplas
http://193.233.20.134
-
api_key
57728dce0f7018e17faf9f061cb2d77048e08414376baf6d860b78e74e83c208
Signatures
-
Detects Stealc stealer 1 IoCs
resource yara_rule behavioral1/memory/1580-155-0x0000000000400000-0x0000000000628000-memory.dmp family_stealc -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ CGIDAAAKJJ.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ntlhost.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion CGIDAAAKJJ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion CGIDAAAKJJ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ntlhost.exe -
Executes dropped EXE 4 IoCs
pid Process 1588 Bpznb.exe 1580 Bpznb.exe 1656 CGIDAAAKJJ.exe 796 ntlhost.exe -
Loads dropped DLL 11 IoCs
pid Process 904 MsiExec.exe 904 MsiExec.exe 904 MsiExec.exe 904 MsiExec.exe 904 MsiExec.exe 1588 Bpznb.exe 904 MsiExec.exe 1580 Bpznb.exe 1580 Bpznb.exe 1156 cmd.exe 1656 CGIDAAAKJJ.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 612 ICACLS.EXE 1788 ICACLS.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" CGIDAAAKJJ.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CGIDAAAKJJ.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ntlhost.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\F: msiexec.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 ntlhost.exe File opened for modification \??\PhysicalDrive0 CGIDAAAKJJ.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1656 CGIDAAAKJJ.exe 796 ntlhost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1588 set thread context of 1580 1588 Bpznb.exe 38 -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\Installer\6c6069.msi msiexec.exe File opened for modification C:\Windows\Installer\6c6069.msi msiexec.exe File created C:\Windows\Installer\6c606a.ipi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Logs\DPX\setuperr.log EXPAND.EXE File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\MSI8FC3.tmp msiexec.exe File opened for modification C:\Windows\Installer\6c606a.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI624D.tmp msiexec.exe File opened for modification C:\Windows\Logs\DPX\setupact.log EXPAND.EXE File opened for modification C:\Windows\Installer\MSI9041.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Bpznb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Bpznb.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 7 Go-http-client/1.1 -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1712 msiexec.exe 1712 msiexec.exe 1580 Bpznb.exe 1656 CGIDAAAKJJ.exe 796 ntlhost.exe -
Suspicious use of AdjustPrivilegeToken 58 IoCs
description pid Process Token: SeShutdownPrivilege 1348 msiexec.exe Token: SeIncreaseQuotaPrivilege 1348 msiexec.exe Token: SeRestorePrivilege 1712 msiexec.exe Token: SeTakeOwnershipPrivilege 1712 msiexec.exe Token: SeSecurityPrivilege 1712 msiexec.exe Token: SeCreateTokenPrivilege 1348 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1348 msiexec.exe Token: SeLockMemoryPrivilege 1348 msiexec.exe Token: SeIncreaseQuotaPrivilege 1348 msiexec.exe Token: SeMachineAccountPrivilege 1348 msiexec.exe Token: SeTcbPrivilege 1348 msiexec.exe Token: SeSecurityPrivilege 1348 msiexec.exe Token: SeTakeOwnershipPrivilege 1348 msiexec.exe Token: SeLoadDriverPrivilege 1348 msiexec.exe Token: SeSystemProfilePrivilege 1348 msiexec.exe Token: SeSystemtimePrivilege 1348 msiexec.exe Token: SeProfSingleProcessPrivilege 1348 msiexec.exe Token: SeIncBasePriorityPrivilege 1348 msiexec.exe Token: SeCreatePagefilePrivilege 1348 msiexec.exe Token: SeCreatePermanentPrivilege 1348 msiexec.exe Token: SeBackupPrivilege 1348 msiexec.exe Token: SeRestorePrivilege 1348 msiexec.exe Token: SeShutdownPrivilege 1348 msiexec.exe Token: SeDebugPrivilege 1348 msiexec.exe Token: SeAuditPrivilege 1348 msiexec.exe Token: SeSystemEnvironmentPrivilege 1348 msiexec.exe Token: SeChangeNotifyPrivilege 1348 msiexec.exe Token: SeRemoteShutdownPrivilege 1348 msiexec.exe Token: SeUndockPrivilege 1348 msiexec.exe Token: SeSyncAgentPrivilege 1348 msiexec.exe Token: SeEnableDelegationPrivilege 1348 msiexec.exe Token: SeManageVolumePrivilege 1348 msiexec.exe Token: SeImpersonatePrivilege 1348 msiexec.exe Token: SeCreateGlobalPrivilege 1348 msiexec.exe Token: SeBackupPrivilege 1164 vssvc.exe Token: SeRestorePrivilege 1164 vssvc.exe Token: SeAuditPrivilege 1164 vssvc.exe Token: SeBackupPrivilege 1712 msiexec.exe Token: SeRestorePrivilege 1712 msiexec.exe Token: SeRestorePrivilege 1104 DrvInst.exe Token: SeRestorePrivilege 1104 DrvInst.exe Token: SeRestorePrivilege 1104 DrvInst.exe Token: SeRestorePrivilege 1104 DrvInst.exe Token: SeRestorePrivilege 1104 DrvInst.exe Token: SeRestorePrivilege 1104 DrvInst.exe Token: SeRestorePrivilege 1104 DrvInst.exe Token: SeLoadDriverPrivilege 1104 DrvInst.exe Token: SeLoadDriverPrivilege 1104 DrvInst.exe Token: SeLoadDriverPrivilege 1104 DrvInst.exe Token: SeRestorePrivilege 1712 msiexec.exe Token: SeTakeOwnershipPrivilege 1712 msiexec.exe Token: SeRestorePrivilege 1712 msiexec.exe Token: SeTakeOwnershipPrivilege 1712 msiexec.exe Token: SeDebugPrivilege 1588 Bpznb.exe Token: SeRestorePrivilege 1712 msiexec.exe Token: SeTakeOwnershipPrivilege 1712 msiexec.exe Token: SeRestorePrivilege 1712 msiexec.exe Token: SeTakeOwnershipPrivilege 1712 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1348 msiexec.exe 1348 Process not Found -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1712 wrote to memory of 904 1712 msiexec.exe 32 PID 1712 wrote to memory of 904 1712 msiexec.exe 32 PID 1712 wrote to memory of 904 1712 msiexec.exe 32 PID 1712 wrote to memory of 904 1712 msiexec.exe 32 PID 1712 wrote to memory of 904 1712 msiexec.exe 32 PID 1712 wrote to memory of 904 1712 msiexec.exe 32 PID 1712 wrote to memory of 904 1712 msiexec.exe 32 PID 904 wrote to memory of 1788 904 MsiExec.exe 33 PID 904 wrote to memory of 1788 904 MsiExec.exe 33 PID 904 wrote to memory of 1788 904 MsiExec.exe 33 PID 904 wrote to memory of 1788 904 MsiExec.exe 33 PID 904 wrote to memory of 1104 904 MsiExec.exe 35 PID 904 wrote to memory of 1104 904 MsiExec.exe 35 PID 904 wrote to memory of 1104 904 MsiExec.exe 35 PID 904 wrote to memory of 1104 904 MsiExec.exe 35 PID 904 wrote to memory of 1588 904 MsiExec.exe 37 PID 904 wrote to memory of 1588 904 MsiExec.exe 37 PID 904 wrote to memory of 1588 904 MsiExec.exe 37 PID 904 wrote to memory of 1588 904 MsiExec.exe 37 PID 904 wrote to memory of 1588 904 MsiExec.exe 37 PID 904 wrote to memory of 1588 904 MsiExec.exe 37 PID 904 wrote to memory of 1588 904 MsiExec.exe 37 PID 1588 wrote to memory of 1580 1588 Bpznb.exe 38 PID 1588 wrote to memory of 1580 1588 Bpznb.exe 38 PID 1588 wrote to memory of 1580 1588 Bpznb.exe 38 PID 1588 wrote to memory of 1580 1588 Bpznb.exe 38 PID 1588 wrote to memory of 1580 1588 Bpznb.exe 38 PID 1588 wrote to memory of 1580 1588 Bpznb.exe 38 PID 1588 wrote to memory of 1580 1588 Bpznb.exe 38 PID 1588 wrote to memory of 1580 1588 Bpznb.exe 38 PID 1588 wrote to memory of 1580 1588 Bpznb.exe 38 PID 1588 wrote to memory of 1580 1588 Bpznb.exe 38 PID 1588 wrote to memory of 1580 1588 Bpznb.exe 38 PID 1588 wrote to memory of 1580 1588 Bpznb.exe 38 PID 904 wrote to memory of 612 904 MsiExec.exe 40 PID 904 wrote to memory of 612 904 MsiExec.exe 40 PID 904 wrote to memory of 612 904 MsiExec.exe 40 PID 904 wrote to memory of 612 904 MsiExec.exe 40 PID 1580 wrote to memory of 1156 1580 Bpznb.exe 43 PID 1580 wrote to memory of 1156 1580 Bpznb.exe 43 PID 1580 wrote to memory of 1156 1580 Bpznb.exe 43 PID 1580 wrote to memory of 1156 1580 Bpznb.exe 43 PID 1156 wrote to memory of 1656 1156 cmd.exe 45 PID 1156 wrote to memory of 1656 1156 cmd.exe 45 PID 1156 wrote to memory of 1656 1156 cmd.exe 45 PID 1156 wrote to memory of 1656 1156 cmd.exe 45 PID 1156 wrote to memory of 1656 1156 cmd.exe 45 PID 1156 wrote to memory of 1656 1156 cmd.exe 45 PID 1156 wrote to memory of 1656 1156 cmd.exe 45 PID 1656 wrote to memory of 796 1656 CGIDAAAKJJ.exe 46 PID 1656 wrote to memory of 796 1656 CGIDAAAKJJ.exe 46 PID 1656 wrote to memory of 796 1656 CGIDAAAKJJ.exe 46 PID 1656 wrote to memory of 796 1656 CGIDAAAKJJ.exe 46 PID 1656 wrote to memory of 796 1656 CGIDAAAKJJ.exe 46 PID 1656 wrote to memory of 796 1656 CGIDAAAKJJ.exe 46 PID 1656 wrote to memory of 796 1656 CGIDAAAKJJ.exe 46 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Bpznb.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1348
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding DC85DCA75786DC43AB17D4A4F124F5B72⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\ICACLS.EXE"C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-b2596610-48eb-4b31-aaea-9c07e0d257cc\." /SETINTEGRITYLEVEL (CI)(OI)HIGH3⤵
- Modifies file permissions
PID:1788
-
-
C:\Windows\SysWOW64\EXPAND.EXE"C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files3⤵
- Drops file in Windows directory
PID:1104
-
-
C:\Users\Admin\AppData\Local\Temp\MW-b2596610-48eb-4b31-aaea-9c07e0d257cc\files\Bpznb.exe"C:\Users\Admin\AppData\Local\Temp\MW-b2596610-48eb-4b31-aaea-9c07e0d257cc\files\Bpznb.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\MW-b2596610-48eb-4b31-aaea-9c07e0d257cc\files\Bpznb.exeC:\Users\Admin\AppData\Local\Temp\MW-b2596610-48eb-4b31-aaea-9c07e0d257cc\files\Bpznb.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\CGIDAAAKJJ.exe"5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\CGIDAAAKJJ.exe"C:\Users\Admin\AppData\Local\Temp\CGIDAAAKJJ.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:796
-
-
-
-
-
-
C:\Windows\SysWOW64\ICACLS.EXE"C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-b2596610-48eb-4b31-aaea-9c07e0d257cc\." /SETINTEGRITYLEVEL (CI)(OI)LOW3⤵
- Modifies file permissions
PID:612
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1164
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000498" "0000000000000240"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1104
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD58a2d9b289c19e05fd0379b82f2919a21
SHA197440fb16a4b8c0ede2d527141749aab76a7a252
SHA256158fa2d1f60e6330072d181063c9b6d2c2c19fd92b5400f382f7d95bfaec1fec
SHA512cd553fea1140ebb0231c1ecb618793e6a4746a35129bc7a7c96e066cd17edf0f1fec65ee483784add1c296b06637e4f0ddf1e13c6e9231ec54ee2fc458acd015
-
Filesize
10.5MB
MD5d75c660c2584891aa2072643e345c941
SHA1cc3ed51870ecd89963428c4d3638c8a99d0ea991
SHA25611b80af6cb8bffedc46b7586644a29e9854ec440421926d7acd40e80b5ba08be
SHA5128a9ab5f164b7268ff56529c35bf97dccedff20f822e2a4daabc97e0af7cfd9f31593df440a337e6b9d84db60e5ed0be6f238545f367dada3012c54f4c61bd7d6
-
Filesize
10.5MB
MD5d75c660c2584891aa2072643e345c941
SHA1cc3ed51870ecd89963428c4d3638c8a99d0ea991
SHA25611b80af6cb8bffedc46b7586644a29e9854ec440421926d7acd40e80b5ba08be
SHA5128a9ab5f164b7268ff56529c35bf97dccedff20f822e2a4daabc97e0af7cfd9f31593df440a337e6b9d84db60e5ed0be6f238545f367dada3012c54f4c61bd7d6
-
Filesize
3.2MB
MD5d48e27fd09c1b7d7efc29939323126fb
SHA1321f957363671d8f0f87eb7a8efac23e5e7252e0
SHA256a74cd4380aa8bdca4391c1a76073bf8ca20c6b605f93d359f46638e994a9d3ce
SHA5123e89a71527a6488b43b19462cbdd00da3650905ae198c94d977dd9140261dfb3d7598da0dd64c197d2629a212498ff65bb29898009d5c757e35465df1b087565
-
Filesize
419.4MB
MD5a4e9f0715d32c9be8021e107373760f2
SHA1dcd98d63ab9e6c235761a07851eddb63c52e0203
SHA256ad97de707946f349b7dba21611eedbc384e0752766826e26d7052cf611fea57a
SHA5121c8bce89f01d0fbe369043229ce0397a4f20e5f234a99c26b1fb47f2eaf8bef4bee06ad48a652f45f977af477ebc23483f5a409c6db03635c4c3bd19054c4ecd
-
Filesize
450.4MB
MD5006eb228a9bd845d61b433fd92c14c55
SHA1cee3aff308017e424765f67381490a67f6683185
SHA2566afef2b84304d798159142ab0c649abbd9ab78c0d6f475bad331c1dfa9f783df
SHA512510e631c91b5cdf47bc7bad5b088c2b31ccd9784f45a2e3b35cbfb2f73e069c17ae63d2fe47f20ff07854f5f631ea5045e96454cca11ae1a33594ccbf198a888
-
Filesize
257.6MB
MD5d1ea46d722c5e51021c27b085a508f20
SHA14f896037e779dccc9f48e112a2fac84806621584
SHA256b0be8a6a4bbbcddf7fb4059b8aac92f1592cd86f8bbdcac16606219d24389c11
SHA512df34d7a8f8f66070e9261c00b45a7df576aaddf07cb5f84c086a5a408f93aaf4387d643c0e37714865d64d40f902498fe52bcbffb0451b78f673086c410bd16c
-
Filesize
1KB
MD56b512166717b22c377ca927988982bab
SHA10d9261a4b90472f4c42cfa13e052b5323ef495f9
SHA256977083166358f5071125a77f46672b139c99c24b0c04e7fb2857cc72da380c15
SHA512c3b8e1472b56c2cc952f49c50a46a60a3386df5240ed7ef62e110618fe23003b5c5b108c5f3be2b32e1420da4f65288b3f8c4a8cfe88ecd6f116c84b6beda198
-
Filesize
1KB
MD561686b42919214e6e306f140f60ae2e0
SHA11758698d7d82b2f0f876f85ed8a9c4b56d5c1019
SHA256155d59215e90ab26c9c876461c34a4406be7550bb07d65b34c1562f46e56c026
SHA512d5ed66c75c2575a835132b82df2f46269c46ffb0874fcae4d945ec6a0eb111cc39522447610179f521881baf13ca0afcd0c95b8b302f844d88f92af0c66d76ab
-
Filesize
382B
MD5c806b36d7244d9e7ddcd43d7c0fa3a22
SHA1e325a2cc3e83463774ad6e9e7f8544a4a7b7b735
SHA2562a5d0cc0650e0b926d01b5f4c189f3553b05021706deb62a6aaf81cf6781c3a6
SHA51293b0e6da60da574637239eb5252f9355921f701139f08c71fd12603211b427e39003d5b3e1b9dba2e1857ab5c4f160892b7f7a2d3922b76201b5dca145cce48a
-
Filesize
1KB
MD56b512166717b22c377ca927988982bab
SHA10d9261a4b90472f4c42cfa13e052b5323ef495f9
SHA256977083166358f5071125a77f46672b139c99c24b0c04e7fb2857cc72da380c15
SHA512c3b8e1472b56c2cc952f49c50a46a60a3386df5240ed7ef62e110618fe23003b5c5b108c5f3be2b32e1420da4f65288b3f8c4a8cfe88ecd6f116c84b6beda198
-
Filesize
127.2MB
MD56d7a59af5c23b6d6a3b9cc59b445dc72
SHA1215887a2ab373aa8f631e15fd6455a22f754233f
SHA2560397dd372705da44ebb99a950c3ed19ecc94f37eb2e7deb6fca2378fa1994e72
SHA512732620f95f4b73f96040e53b50f81c64941eb47f21696b2f2ecb7784bd6d2e3915c2f4ddc173e1067b1040585a51f3e8717814aefb1456667edfa0ad7fbb07bb
-
Filesize
131.4MB
MD5cb37aae7c92c3b9e79ea78f920c86038
SHA13a4943460d22208dd75ff55e553ead31339fde9f
SHA2560ce5e868b3ad205abd59ba430b06d4f50bef7de279e72919b574fd692410717e
SHA5125f58ed51f0e2581ba5d5c99c30bf6441e8209a5305ff3afb0bb76de352b0e5360d3bd141b4029b81e1f5c6e1554bc84c954f698432324766c75bd4af8e6113ed
-
Filesize
208KB
MD5d82b3fb861129c5d71f0cd2874f97216
SHA1f3fe341d79224126e950d2691d574d147102b18d
SHA256107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c
SHA512244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b
-
Filesize
208KB
MD5d82b3fb861129c5d71f0cd2874f97216
SHA1f3fe341d79224126e950d2691d574d147102b18d
SHA256107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c
SHA512244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
10.5MB
MD5d75c660c2584891aa2072643e345c941
SHA1cc3ed51870ecd89963428c4d3638c8a99d0ea991
SHA25611b80af6cb8bffedc46b7586644a29e9854ec440421926d7acd40e80b5ba08be
SHA5128a9ab5f164b7268ff56529c35bf97dccedff20f822e2a4daabc97e0af7cfd9f31593df440a337e6b9d84db60e5ed0be6f238545f367dada3012c54f4c61bd7d6
-
Filesize
458.2MB
MD5eb3628748aac5cdd5e44e8b9389a2a18
SHA1bc9fc8f2f95e5e936b6fe954478bf888043fc096
SHA25623e8af3aa199d7d22afc8c08b9befc85da5d925a533bec14c294d50a11f3d799
SHA512ee798c3740fe354ecbb6451fab027ed419955de7e01940f76045fab89fe265aeb0b266f7b66438fb8d7bdea83670e2110f4265ca6da4d9766ce54da04331ccae
-
Filesize
457.1MB
MD56d9213bd431fa903898c778670ad298b
SHA1e9ccdef24743af054d6f4647cb388af3ecf1d344
SHA256d14d7199c3c2712c903f067d95c97cc24b6519414fd8dc1a4c981e7f92a77d2d
SHA51219029db75f0d5121f6876aa2a839f90c8b65225eaa141bbccd63ae9cd96896a2a1bcbd600e4c40f7d80ae63526205eaa8cf16038a1be98302459bf56be9e590c
-
Filesize
452.7MB
MD5fb8f4419c4be13e77adfcd08642d39f1
SHA175ac229c713beb616b555026fb430f87696e55b4
SHA25639a1887d34c1f4516c2d4867471806274139220e757f5d0ce5cf9832e983cd11
SHA5124039759c166c3a4b36d7608d809885e4c99543b5942d542be6126b25ec3f7f13cb4bbd36de2c7e44c09f7c4ef7a7ebb2a40c1c3e4cab4d3996f6c9b2066672ff
-
Filesize
457.1MB
MD578d70c0c9d9a10517f4dc9cba7e98a09
SHA1fab1b6d4bacae473e1af75fff98a1a8606e34256
SHA256e1d97b5f63d4f37a4d1c8987719c5a0a66af58a223895a9501b8407e62bbcf8e
SHA512bb983e454596ec9c7dd880deac175c9ae54c6be6d967afa10313b6ad33b938a2251500f29803640e8ce3f9884e79092a5c9c735efbd38d86e24fb88781ddf16d
-
Filesize
264.6MB
MD57476b86a5bac70db52618514d49561fd
SHA1681116ad1f24925761334c883ec2023eac67b222
SHA256c4d9d151fe8d99af951f512ef88ffefe46ed8178033020acbc4b085d080261fc
SHA5125e6ee5eb5dcb3b622f6a5fb08e02fa9f1f9dda4c37b0b42434a785ed14d102370525388d3800e31d9e0e0b70c5a75e150daf811a5b7cb38ccc25d3b1f5e8d1b3
-
Filesize
131.8MB
MD52a511873f1335ceeda7e86b0b318bee6
SHA190f0f3eb1c07c40589f273cc9e12d6b5e73ec7a0
SHA2562049549e0edc1f00266e2d555a4622d547dc51f09bfd469a7cc501c807dba48c
SHA5127c75ca9ac0642812d8e8f5f10f50f09fff29f8b17915c2a443114dbc408e99d0fea8394eed9e1d817851272381c12c2f4eac10eb8b6af908bf6b4ec3f3d26a74
-
Filesize
208KB
MD5d82b3fb861129c5d71f0cd2874f97216
SHA1f3fe341d79224126e950d2691d574d147102b18d
SHA256107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c
SHA512244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b
-
Filesize
208KB
MD5d82b3fb861129c5d71f0cd2874f97216
SHA1f3fe341d79224126e950d2691d574d147102b18d
SHA256107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c
SHA512244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b