Overview
overview
7Static
static
7MultiBit/B...ng.dll
windows10-2004-x64
1MultiBit/B....3.dll
windows10-2004-x64
1MultiBit/B...on.dll
windows10-2004-x64
1MultiBit/B...on.dll
windows10-2004-x64
1MultiBit/B...el.dll
windows10-2004-x64
1MultiBit/B...or.dll
windows10-2004-x64
1MultiBit/B...el.dll
windows10-2004-x64
1MultiBit/B...on.dll
windows10-2004-x64
1MultiBit/L...et.dll
windows10-2004-x64
1MultiBit/MultiBit.exe
windows10-2004-x64
7MultiBit/Qt5Core.dll
windows10-2004-x64
3MultiBit/_asyncio.dll
windows10-2004-x64
3MultiBit/_bz2.dll
windows10-2004-x64
3MultiBit/_...32.dll
windows10-2004-x64
3MultiBit/_ctypes.dll
windows10-2004-x64
1MultiBit/_decimal.dll
windows10-2004-x64
3MultiBit/b...b2.pyi
windows10-2004-x64
3MultiBit/b...b2.pyi
windows10-2004-x64
3MultiBit/b...b2.pyi
windows10-2004-x64
3MultiBit/b...b2.pyi
windows10-2004-x64
3MultiBit/b...b2.pyi
windows10-2004-x64
3MultiBit/b...b2.pyi
windows10-2004-x64
3MultiBit/b...b2.pyi
windows10-2004-x64
3MultiBit/b...b2.pyi
windows10-2004-x64
3MultiBit/b...b2.pyi
windows10-2004-x64
3MultiBit/c...rt.pem
windows10-2004-x64
3MultiBit/d...47.dll
windows10-2004-x64
3MultiBit/libEGL.dll
windows10-2004-x64
1MultiBit/libeay32.dll
windows10-2004-x64
1MultiBit/m....typed
windows10-2004-x64
3MultiBit/python3.dll
windows10-2004-x64
3MultiBit/python39.dll
windows10-2004-x64
3Analysis
-
max time kernel
106s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21-03-2023 14:43
Behavioral task
behavioral1
Sample
MultiBit/Bunifu.Licensing.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral2
Sample
MultiBit/Bunifu.UI.WinForms.1.5.3.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
MultiBit/Bunifu.UI.WinForms.BunifuButton.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral4
Sample
MultiBit/Bunifu.UI.WinForms.BunifuImageButton.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
MultiBit/Bunifu.UI.WinForms.BunifuPanel.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral6
Sample
MultiBit/Bunifu.UI.WinForms.BunifuSeparator.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral7
Sample
MultiBit/Bunifu.UI.WinForms.BunifuShadowPanel.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral8
Sample
MultiBit/Bunifu.UI.WinForms.BunifuTransition.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
MultiBit/Leaf.xNet.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral10
Sample
MultiBit/MultiBit.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
MultiBit/Qt5Core.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral12
Sample
MultiBit/_asyncio.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral13
Sample
MultiBit/_bz2.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral14
Sample
MultiBit/_cffi_backend.cp39-win32.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
MultiBit/_ctypes.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral16
Sample
MultiBit/_decimal.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
MultiBit/bitbox02/communication/generated/bitbox02_system_pb2.pyi
Resource
win10v2004-20230220-en
Behavioral task
behavioral18
Sample
MultiBit/bitbox02/communication/generated/btc_pb2.pyi
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
MultiBit/bitbox02/communication/generated/common_pb2.pyi
Resource
win10v2004-20230221-en
Behavioral task
behavioral20
Sample
MultiBit/bitbox02/communication/generated/eth_pb2.pyi
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
MultiBit/bitbox02/communication/generated/hww_pb2.pyi
Resource
win10v2004-20230220-en
Behavioral task
behavioral22
Sample
MultiBit/bitbox02/communication/generated/keystore_pb2.pyi
Resource
win10v2004-20230220-en
Behavioral task
behavioral23
Sample
MultiBit/bitbox02/communication/generated/mnemonic_pb2.pyi
Resource
win10v2004-20230220-en
Behavioral task
behavioral24
Sample
MultiBit/bitbox02/communication/generated/perform_attestation_pb2.pyi
Resource
win10v2004-20230221-en
Behavioral task
behavioral25
Sample
MultiBit/bitbox02/communication/generated/system_pb2.pyi
Resource
win10v2004-20230220-en
Behavioral task
behavioral26
Sample
MultiBit/certifi/cacert.pem
Resource
win10v2004-20230220-en
Behavioral task
behavioral27
Sample
MultiBit/d3dcompiler_47.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral28
Sample
MultiBit/libEGL.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral29
Sample
MultiBit/libeay32.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral30
Sample
MultiBit/mnemonic/py.typed
Resource
win10v2004-20230221-en
Behavioral task
behavioral31
Sample
MultiBit/python3.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral32
Sample
MultiBit/python39.dll
Resource
win10v2004-20230221-en
General
-
Target
MultiBit/MultiBit.exe
-
Size
324KB
-
MD5
0f39821d5744907e68885862080c6234
-
SHA1
71e263f94a80d6cd1df1349c4a2202ef5f2518c3
-
SHA256
86f783a90ebc8f381e8c6484d412cce8e587d003856b522b271ca15691e9dd8b
-
SHA512
38299692594b995607987e1369d7c2c8913e8daec076b3779a61033093290e69fab1fb8cae0a83a80643a825f67b41a81eb17d21736054a656067ae8bcf93cbc
-
SSDEEP
3072:Ex+JMeg3Z0EeYesNKnXORQtmGWA68rdCbyzziT6hTnNPmxZjmsNKnXOZu:Ov4XORAmGc8rdCbkziksZ4XOZ
Malware Config
Signatures
-
Obfuscated with Agile.Net obfuscator 3 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral10/memory/1748-138-0x0000000005270000-0x0000000005280000-memory.dmp agile_net behavioral10/memory/1748-139-0x0000000005D20000-0x0000000005D2E000-memory.dmp agile_net behavioral10/memory/1748-140-0x0000000006FE0000-0x000000000712A000-memory.dmp agile_net -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
Processes:
taskmgr.exepid process 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
MultiBit.exetaskmgr.exedescription pid process Token: SeDebugPrivilege 1748 MultiBit.exe Token: SeDebugPrivilege 5024 taskmgr.exe Token: SeSystemProfilePrivilege 5024 taskmgr.exe Token: SeCreateGlobalPrivilege 5024 taskmgr.exe Token: 33 5024 taskmgr.exe Token: SeIncBasePriorityPrivilege 5024 taskmgr.exe -
Suspicious use of FindShellTrayWindow 42 IoCs
Processes:
MultiBit.exetaskmgr.exepid process 1748 MultiBit.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe -
Suspicious use of SendNotifyMessage 40 IoCs
Processes:
taskmgr.exepid process 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe 5024 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\MultiBit\MultiBit.exe"C:\Users\Admin\AppData\Local\Temp\MultiBit\MultiBit.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1748-133-0x00000000007A0000-0x00000000007F6000-memory.dmpFilesize
344KB
-
memory/1748-134-0x0000000005660000-0x0000000005C04000-memory.dmpFilesize
5.6MB
-
memory/1748-135-0x00000000051A0000-0x0000000005232000-memory.dmpFilesize
584KB
-
memory/1748-136-0x00000000052E0000-0x00000000052F0000-memory.dmpFilesize
64KB
-
memory/1748-137-0x0000000005250000-0x000000000525A000-memory.dmpFilesize
40KB
-
memory/1748-138-0x0000000005270000-0x0000000005280000-memory.dmpFilesize
64KB
-
memory/1748-139-0x0000000005D20000-0x0000000005D2E000-memory.dmpFilesize
56KB
-
memory/1748-140-0x0000000006FE0000-0x000000000712A000-memory.dmpFilesize
1.3MB
-
memory/1748-141-0x0000000009720000-0x0000000009746000-memory.dmpFilesize
152KB
-
memory/1748-142-0x00000000052E0000-0x00000000052F0000-memory.dmpFilesize
64KB
-
memory/1748-143-0x00000000052E0000-0x00000000052F0000-memory.dmpFilesize
64KB
-
memory/1748-144-0x00000000052E0000-0x00000000052F0000-memory.dmpFilesize
64KB
-
memory/1748-145-0x00000000052E0000-0x00000000052F0000-memory.dmpFilesize
64KB
-
memory/1748-146-0x00000000052E0000-0x00000000052F0000-memory.dmpFilesize
64KB
-
memory/1748-147-0x00000000052E0000-0x00000000052F0000-memory.dmpFilesize
64KB
-
memory/1748-148-0x00000000052E0000-0x00000000052F0000-memory.dmpFilesize
64KB
-
memory/1748-149-0x00000000052E0000-0x00000000052F0000-memory.dmpFilesize
64KB
-
memory/1748-150-0x00000000052E0000-0x00000000052F0000-memory.dmpFilesize
64KB
-
memory/5024-151-0x0000018738B60000-0x0000018738B61000-memory.dmpFilesize
4KB
-
memory/5024-152-0x0000018738B60000-0x0000018738B61000-memory.dmpFilesize
4KB
-
memory/5024-153-0x0000018738B60000-0x0000018738B61000-memory.dmpFilesize
4KB
-
memory/5024-157-0x0000018738B60000-0x0000018738B61000-memory.dmpFilesize
4KB
-
memory/5024-158-0x0000018738B60000-0x0000018738B61000-memory.dmpFilesize
4KB
-
memory/5024-159-0x0000018738B60000-0x0000018738B61000-memory.dmpFilesize
4KB
-
memory/5024-160-0x0000018738B60000-0x0000018738B61000-memory.dmpFilesize
4KB
-
memory/5024-161-0x0000018738B60000-0x0000018738B61000-memory.dmpFilesize
4KB
-
memory/5024-162-0x0000018738B60000-0x0000018738B61000-memory.dmpFilesize
4KB
-
memory/5024-163-0x0000018738B60000-0x0000018738B61000-memory.dmpFilesize
4KB