Analysis
-
max time kernel
143s -
max time network
165s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 11:52
Behavioral task
behavioral1
Sample
bb854bcec3c2fa45999a21f44cfb64f15971ab4f9fb92c05a46e30f969c289cc.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
bb854bcec3c2fa45999a21f44cfb64f15971ab4f9fb92c05a46e30f969c289cc.exe
Resource
win10v2004-20230915-en
General
-
Target
bb854bcec3c2fa45999a21f44cfb64f15971ab4f9fb92c05a46e30f969c289cc.exe
-
Size
1.6MB
-
MD5
d717c4042e527594b9922a9654f1cdad
-
SHA1
58a13b3ee45bc0fa2324816d2b5decf31708bf69
-
SHA256
bb854bcec3c2fa45999a21f44cfb64f15971ab4f9fb92c05a46e30f969c289cc
-
SHA512
5ba9c553b83a594f4f68875767f8a233c0ecc089c050269c267563b702763d2ae24e7dcd7b8714fa614cd5da9431a135cb87cb548ec340e4c7af537224a28ea2
-
SSDEEP
49152:/FP/WJsX3duehq6M+0Fi3C48J/tkYOXTnRgoQ/7/TyfkaRtg:kJG3oehxH04S48J/tkYOXTnuoQz2fd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1924 Bugreport-262408.dll -
Loads dropped DLL 3 IoCs
pid Process 1164 bb854bcec3c2fa45999a21f44cfb64f15971ab4f9fb92c05a46e30f969c289cc.exe 1164 bb854bcec3c2fa45999a21f44cfb64f15971ab4f9fb92c05a46e30f969c289cc.exe 1164 bb854bcec3c2fa45999a21f44cfb64f15971ab4f9fb92c05a46e30f969c289cc.exe -
resource yara_rule behavioral1/memory/1164-0-0x0000000000400000-0x000000000086C000-memory.dmp upx behavioral1/memory/1164-5-0x0000000000400000-0x000000000086C000-memory.dmp upx behavioral1/memory/1164-7-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1164-6-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1164-8-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1164-9-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1164-11-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1164-13-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1164-15-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1164-17-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1164-19-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1164-21-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1164-23-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1164-25-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1164-27-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1164-29-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1164-31-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1164-33-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1164-35-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1164-37-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1164-39-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1164-41-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1164-43-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1164-45-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1164-47-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1164-49-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1164-51-0x0000000002990000-0x0000000002A02000-memory.dmp upx behavioral1/memory/1164-50-0x0000000002990000-0x0000000002A02000-memory.dmp upx behavioral1/memory/1164-52-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1164-55-0x0000000000400000-0x000000000086C000-memory.dmp upx behavioral1/memory/1164-56-0x0000000002990000-0x0000000002A02000-memory.dmp upx behavioral1/memory/1164-57-0x0000000000400000-0x000000000086C000-memory.dmp upx behavioral1/memory/1164-59-0x0000000000400000-0x000000000086C000-memory.dmp upx behavioral1/memory/1164-62-0x0000000000400000-0x000000000086C000-memory.dmp upx behavioral1/memory/1164-65-0x0000000000400000-0x000000000086C000-memory.dmp upx behavioral1/memory/1164-106-0x0000000000400000-0x000000000086C000-memory.dmp upx behavioral1/memory/1164-107-0x0000000000400000-0x000000000086C000-memory.dmp upx behavioral1/memory/1164-108-0x0000000000400000-0x000000000086C000-memory.dmp upx behavioral1/memory/1164-109-0x0000000000400000-0x000000000086C000-memory.dmp upx behavioral1/memory/1164-110-0x0000000000400000-0x000000000086C000-memory.dmp upx behavioral1/memory/1164-111-0x0000000000400000-0x000000000086C000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 bb854bcec3c2fa45999a21f44cfb64f15971ab4f9fb92c05a46e30f969c289cc.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main bb854bcec3c2fa45999a21f44cfb64f15971ab4f9fb92c05a46e30f969c289cc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1164 bb854bcec3c2fa45999a21f44cfb64f15971ab4f9fb92c05a46e30f969c289cc.exe 1164 bb854bcec3c2fa45999a21f44cfb64f15971ab4f9fb92c05a46e30f969c289cc.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1164 bb854bcec3c2fa45999a21f44cfb64f15971ab4f9fb92c05a46e30f969c289cc.exe 1164 bb854bcec3c2fa45999a21f44cfb64f15971ab4f9fb92c05a46e30f969c289cc.exe 1164 bb854bcec3c2fa45999a21f44cfb64f15971ab4f9fb92c05a46e30f969c289cc.exe 1164 bb854bcec3c2fa45999a21f44cfb64f15971ab4f9fb92c05a46e30f969c289cc.exe 1164 bb854bcec3c2fa45999a21f44cfb64f15971ab4f9fb92c05a46e30f969c289cc.exe 1164 bb854bcec3c2fa45999a21f44cfb64f15971ab4f9fb92c05a46e30f969c289cc.exe 1924 Bugreport-262408.dll -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1164 wrote to memory of 1924 1164 bb854bcec3c2fa45999a21f44cfb64f15971ab4f9fb92c05a46e30f969c289cc.exe 32 PID 1164 wrote to memory of 1924 1164 bb854bcec3c2fa45999a21f44cfb64f15971ab4f9fb92c05a46e30f969c289cc.exe 32 PID 1164 wrote to memory of 1924 1164 bb854bcec3c2fa45999a21f44cfb64f15971ab4f9fb92c05a46e30f969c289cc.exe 32 PID 1164 wrote to memory of 1924 1164 bb854bcec3c2fa45999a21f44cfb64f15971ab4f9fb92c05a46e30f969c289cc.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb854bcec3c2fa45999a21f44cfb64f15971ab4f9fb92c05a46e30f969c289cc.exe"C:\Users\Admin\AppData\Local\Temp\bb854bcec3c2fa45999a21f44cfb64f15971ab4f9fb92c05a46e30f969c289cc.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\data\Bugreport-262408.dllC:\Users\Admin\AppData\Local\Temp\data\Bugreport-262408.dll Bugreport %E6%89%B9%E9%87%8F%E8%AF%B4%202⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5df3f47c7b0e47088fcfb374c56029dd3
SHA1a99bfbfa23730daf6e95c69aa04ca8155eae4f49
SHA256a8dca3b6bd75c077aca0a46a77f5e99f43567c53a7e999b7ca5db07c79bcacc2
SHA512a194867b4c9cb54081d222f665da30229ed388dd6d966df51686f4af7cca12acde9364706aadf283b77e6b14d6da5d9029a89f3050c4e129b0dfc499654f9730
-
Filesize
168KB
MD5df3f47c7b0e47088fcfb374c56029dd3
SHA1a99bfbfa23730daf6e95c69aa04ca8155eae4f49
SHA256a8dca3b6bd75c077aca0a46a77f5e99f43567c53a7e999b7ca5db07c79bcacc2
SHA512a194867b4c9cb54081d222f665da30229ed388dd6d966df51686f4af7cca12acde9364706aadf283b77e6b14d6da5d9029a89f3050c4e129b0dfc499654f9730
-
Filesize
81B
MD5f972b10c4149b0b5c28506fc571dd215
SHA1a3bec9d935987ff0753c98c40b980f36596d9ffc
SHA256968eb86fe51b83a8295d1994d240b38cdddbeab226b0177af20349e7b5ef7019
SHA5128c6636b8646040f2c252ab9720ff5c3e21091626d226cede48d6e792793d5c4464d8d407287397101146694106863c578a916a5154f0f3bb4fa6ef02fdf7a371
-
Filesize
168KB
MD5df3f47c7b0e47088fcfb374c56029dd3
SHA1a99bfbfa23730daf6e95c69aa04ca8155eae4f49
SHA256a8dca3b6bd75c077aca0a46a77f5e99f43567c53a7e999b7ca5db07c79bcacc2
SHA512a194867b4c9cb54081d222f665da30229ed388dd6d966df51686f4af7cca12acde9364706aadf283b77e6b14d6da5d9029a89f3050c4e129b0dfc499654f9730
-
Filesize
168KB
MD5df3f47c7b0e47088fcfb374c56029dd3
SHA1a99bfbfa23730daf6e95c69aa04ca8155eae4f49
SHA256a8dca3b6bd75c077aca0a46a77f5e99f43567c53a7e999b7ca5db07c79bcacc2
SHA512a194867b4c9cb54081d222f665da30229ed388dd6d966df51686f4af7cca12acde9364706aadf283b77e6b14d6da5d9029a89f3050c4e129b0dfc499654f9730
-
Filesize
724KB
MD5a96fbd5e66b31f3d816ad80f623e9bd9
SHA14eda42260bd3eb930cd4eafd7d15c6af367bcf18
SHA2562e67ba278646fde95bb614dcbcc7da1c6bf7976c918b2c6ad3d78640000326f3
SHA51243921107313775ea14b1bd33cf758c13798f4fa1c1074771c1c96b1b43b98f3416d249ed8ab3171383772d0054829c3754a91b5e94135f1df6d67a76f599c80e