Analysis

  • max time kernel
    122s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 15:59

General

  • Target

    04a47d3ff527137f9f69e5d6ef82aecf.exe

  • Size

    170KB

  • MD5

    04a47d3ff527137f9f69e5d6ef82aecf

  • SHA1

    b1f09d5fa2ac23d09560ee25be123bbc4766fc5e

  • SHA256

    cf26d109210faef7d11e7f953e33f4b822624f5c8550fdad723bb63ac915a4e8

  • SHA512

    eb76cfbbf9d5064cf57628226cd5f61a807c163ea2279bd78087863ff62813c7c6dae8799e0cff7a5e20cc5a770610747f8c819928f71a2bfef5a302a26177da

  • SSDEEP

    3072:rFbZKoyQ4KBI1Jm1ozz7nFXpVcU1qboubhq8j1icx3nhtn1R9J2tGt50QiQ:rPKjQb1uFjcUuoikO/x3hvJ2ktEQ

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 19 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 24 IoCs
  • Modifies registry class 43 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04a47d3ff527137f9f69e5d6ef82aecf.exe
    "C:\Users\Admin\AppData\Local\Temp\04a47d3ff527137f9f69e5d6ef82aecf.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\Users\Admin\AppData\Local\Temp\mms_842.exe
      "C:\Users\Admin\AppData\Local\Temp\mms_842.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2504
      • C:\Users\Admin\AppData\Local\Temp\MIS_842_0.EXE
        C:\Users\Admin\AppData\Local\Temp\MIS_842_0.EXE
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Modifies registry class
        PID:688
  • C:\Windows\SysWOW64\rundll32.exe
    C:\Windows\SysWOW64\rundll32.exe C:\PROGRA~1\bhae\iohl.dll,Service
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:1928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~1\bhae\yexb.ini

    Filesize

    126B

    MD5

    48e6b3c7c381216ecc744766ebce733f

    SHA1

    a9e59cbea13588244c1a595b96004a156dfc1b15

    SHA256

    bd71efcf28ac1f5703149e3c513884f899169660c07d3b38de128df19fa9a7e5

    SHA512

    41b34582b5802ca142e28246c441a63af2dd064b45e205c8344155554bc179a5b8327950d578e2bacdfdfb65e9569243162099cd31da49ee681c50e83e0bde4c

  • C:\Program Files\bhae\agsd.ini

    Filesize

    170B

    MD5

    d2811f5b48688e11101895544aea1db4

    SHA1

    b8adb163103782d743f8362e8f8c7352a6b689eb

    SHA256

    52cb7172d1e263eefc8108cceed3db3641ce5e46f2eace20df57c13fb746592a

    SHA512

    a8946977c3e79e17af77a923377819fd80a1f230ab353677479a1496e3d1718e0962f9cbd39418787ae9192f64d039dd35b3584ddaef77eaf4dfc8e8f84d6b0d

  • \Program Files\bhae\flei.dll

    Filesize

    136KB

    MD5

    b8da817f1a45e4a4b4558a00850e4ec9

    SHA1

    3c664c8cc0be885c83c827f257ca46e80fc459ae

    SHA256

    2dbac9dc27c0c89c389246158b00a5bb90bbbd0d17181aea796dd6813186ad42

    SHA512

    a9d653f35e2f3e4eb3e70f40b900adbdc7ddcad4960a2e4435170e4c0a7658f2a72456a2c00bb687a69dacbf97813e6d130677da094c6bbe3c2c75f3a1e095d0

  • \Users\Admin\AppData\Local\Temp\MIS_842_0.EXE

    Filesize

    292KB

    MD5

    3aa1f59d957eb88623ec689e51782c39

    SHA1

    5d5a2a1233c21da874d374ef0ab4ad216c28efba

    SHA256

    a470cc4d234fa12304d4df0604ffd93c64631af129031385e1242d9e7338876d

    SHA512

    e5e50336f7c19c7b15f902ee6903151fab22562c55d3208cfa5dff2591430bba18231d979ad8c169ee47486de586267c48236d567883c636b2eb7802f5ffb1a6

  • \Users\Admin\AppData\Local\Temp\mms_842.exe

    Filesize

    128KB

    MD5

    082516a1315529c41be2ea45efb992db

    SHA1

    475cbc1f34eb85e723b98a89c31714733cc0320a

    SHA256

    c69a1dceaf4fc08d2f27b928968b5665a75eb9733d7a0376d07aac6c67b88d54

    SHA512

    06f40cdafc48e8f89630b2dc70b8545c761333816d200bc57d70b1dd92108be259fdbd50f0a48ee4cc947b11799e6ca2b00c139f73f7c8c3f0a2d2554ed2ca87

  • memory/2924-0-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/2924-1-0x0000000000220000-0x0000000000222000-memory.dmp

    Filesize

    8KB

  • memory/2924-3-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/2924-4-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/2924-13-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB