Analysis

  • max time kernel
    151s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 14:33

General

  • Target

    0138251f7e852ce9d9f50ecf04e3448d.exe

  • Size

    504KB

  • MD5

    0138251f7e852ce9d9f50ecf04e3448d

  • SHA1

    f832e625b28f36432823ca0134333fcc02fad934

  • SHA256

    e7c194ac7aa9b05a9246bb4637a79b4cc2bee9d1185c3fbeeef9b66e9ee35fe7

  • SHA512

    7d405dedbfd74a7a5c0fd239bee2191cc73a7cd1e861ed3c1ffad33ebe5fed445668930b298a2d6fd29d7ca5f93d50d2df8767de570c31c3960069b3a52ee4c4

  • SSDEEP

    12288:gBY3ifCIZ56z84S9j/YP1rpgBN8i/egqYrOKiTbsATHZDZQZ:gBY3yCIf6A4S/i4N/ewwTFaZ

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 24 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 18 IoCs
  • Drops file in Windows directory 13 IoCs
  • Modifies registry class 51 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0138251f7e852ce9d9f50ecf04e3448d.exe
    "C:\Users\Admin\AppData\Local\Temp\0138251f7e852ce9d9f50ecf04e3448d.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2444
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\a1l8.dll"
      2⤵
        PID:2748
      • C:\Windows\SysWOW64\regsvr32.exe
        C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\b4cb.dll"
        2⤵
          PID:1076
        • C:\Windows\SysWOW64\regsvr32.exe
          C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\4f3r.dll"
          2⤵
            PID:860
          • C:\Windows\SysWOW64\regsvr32.exe
            C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\8b4o.dll"
            2⤵
              PID:3012
            • C:\Windows\SysWOW64\regsvr32.exe
              C:\Windows\system32\regsvr32.exe /s "C:\Windows\system32\8b4o.dll"
              2⤵
              • Loads dropped DLL
              • Installs/modifies Browser Helper Object
              • Modifies registry class
              PID:4132
            • C:\Windows\SysWOW64\bffd.exe
              C:\Windows\system32\bffd.exe -i
              2⤵
              • Executes dropped EXE
              PID:4436
            • C:\Windows\SysWOW64\bffd.exe
              C:\Windows\system32\bffd.exe -s
              2⤵
              • Executes dropped EXE
              PID:2788
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\system32\rundll32 C:\Windows\system32\841e.dll, Always
              2⤵
              • Loads dropped DLL
              • Writes to the Master Boot Record (MBR)
              • Drops file in System32 directory
              PID:4352
          • C:\Windows\SysWOW64\bffd.exe
            C:\Windows\SysWOW64\bffd.exe
            1⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Loads dropped DLL
            • Writes to the Master Boot Record (MBR)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3264
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\system32\rundll32 C:\Windows\system32\841e.dll,Always
              2⤵
              • Loads dropped DLL
              PID:5064

          Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\b.dll

                  Filesize

                  248KB

                  MD5

                  1898667756a4fc5b7baab441592801c9

                  SHA1

                  8cf129f13e2ed5e91a9be64f4283f920ba2bb5a8

                  SHA256

                  b09cedc47213ab70ce51158947e703c8f02e9991889e5eec895a9c315c9c6ef9

                  SHA512

                  136cf12dad8c3a5a70028eb28807bcfae4c898b5129b05cbed4a180a1361ef1484d657bc67e3d2ce2706166fecc6ae6bc3353c79839514448a2741fc17ca26ee

                • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\msn.exe

                  Filesize

                  154KB

                  MD5

                  597cdd658ac7e30181d0265ec6629b16

                  SHA1

                  de2606b02626081d5507c37b8d5e7525a8a77485

                  SHA256

                  9435bd5aacf226d606cccb78fde80d04de86b5d0defbd58a28bff8ef8cece8cb

                  SHA512

                  1173ad6f96f6f3d2eb7f79e7dd66b42f07e3b8cc89e97d6b2e19e24e0670eb416c9d300b9f35c1b1992bfbe7b113b805ec5bda34349b3cf7be6646f8570bd05e

                • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\p.dll

                  Filesize

                  241KB

                  MD5

                  50ad554d7ef3069bb514aa6fe2184307

                  SHA1

                  7820685e1b8a512f16e70bfaa85e2ef7d1ac7146

                  SHA256

                  fc8d733b834dfbbc3d794895906e8789384ed282cd3d07764f8870624cae395a

                  SHA512

                  4abf8cc56cc4fe4ad6b2452da2b4d280366661c796c3a8e649851a532df0b867986ce1be0dae6f4658155250d0615413cf4969283e6dd0a535b49ab997b0243a

                • C:\Windows\SysWOW64\bffd.exe

                  Filesize

                  113KB

                  MD5

                  12d565d6c7b882c910c9a5f519a3d2ae

                  SHA1

                  e7692e46f52b9cfb4dfb686aed896313b0788c7b

                  SHA256

                  6a925a91325b996fc7834c371192994a789e74a3bf4c4c759417213c17b9e6b3

                  SHA512

                  6822f16abd6bd172c49fcd3d9ad02faf252a4b2a97b6afecda488007d245eab86dea7b57432b7d77b764276500744ab44e56f2fdb120759c86b6271f748b7109

                • memory/2788-70-0x0000000000020000-0x0000000000022000-memory.dmp

                  Filesize

                  8KB

                • memory/2788-74-0x0000000000400000-0x000000000041C000-memory.dmp

                  Filesize

                  112KB

                • memory/3264-107-0x0000000000400000-0x000000000041C000-memory.dmp

                  Filesize

                  112KB

                • memory/3264-110-0x0000000000400000-0x000000000041C000-memory.dmp

                  Filesize

                  112KB

                • memory/3264-73-0x00000000001C0000-0x00000000001C2000-memory.dmp

                  Filesize

                  8KB

                • memory/3264-133-0x0000000000400000-0x000000000041C000-memory.dmp

                  Filesize

                  112KB

                • memory/3264-129-0x0000000000400000-0x000000000041C000-memory.dmp

                  Filesize

                  112KB

                • memory/3264-125-0x0000000000400000-0x000000000041C000-memory.dmp

                  Filesize

                  112KB

                • memory/3264-122-0x0000000000400000-0x000000000041C000-memory.dmp

                  Filesize

                  112KB

                • memory/3264-119-0x0000000000400000-0x000000000041C000-memory.dmp

                  Filesize

                  112KB

                • memory/3264-115-0x0000000000400000-0x000000000041C000-memory.dmp

                  Filesize

                  112KB

                • memory/3264-92-0x0000000000400000-0x000000000041C000-memory.dmp

                  Filesize

                  112KB

                • memory/3264-72-0x0000000000400000-0x000000000041C000-memory.dmp

                  Filesize

                  112KB

                • memory/3264-96-0x0000000000400000-0x000000000041C000-memory.dmp

                  Filesize

                  112KB

                • memory/3264-104-0x0000000000400000-0x000000000041C000-memory.dmp

                  Filesize

                  112KB

                • memory/3264-100-0x0000000000400000-0x000000000041C000-memory.dmp

                  Filesize

                  112KB

                • memory/4352-97-0x0000000010000000-0x00000000100B2000-memory.dmp

                  Filesize

                  712KB

                • memory/4352-94-0x0000000010000000-0x00000000100B2000-memory.dmp

                  Filesize

                  712KB

                • memory/4352-87-0x0000000000F70000-0x0000000000F72000-memory.dmp

                  Filesize

                  8KB

                • memory/4352-84-0x0000000010000000-0x00000000100B2000-memory.dmp

                  Filesize

                  712KB

                • memory/4436-65-0x0000000000400000-0x000000000041C000-memory.dmp

                  Filesize

                  112KB

                • memory/4436-67-0x00000000001C0000-0x00000000001C2000-memory.dmp

                  Filesize

                  8KB

                • memory/4436-68-0x0000000000400000-0x000000000041C000-memory.dmp

                  Filesize

                  112KB

                • memory/5064-88-0x0000000002780000-0x0000000002782000-memory.dmp

                  Filesize

                  8KB

                • memory/5064-86-0x0000000010000000-0x00000000100B2000-memory.dmp

                  Filesize

                  712KB