Analysis

  • max time kernel
    2s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/12/2023, 21:15

General

  • Target

    f8a1f8aadd4147e3edf64c3b918cd82f.exe

  • Size

    500KB

  • MD5

    f8a1f8aadd4147e3edf64c3b918cd82f

  • SHA1

    ce18df2b93cf2b7de5522f85609cc8156d33c7d6

  • SHA256

    4ff70e12968b0755f9614b87975551aeb47c6d45e7a87d83f370a0324c4ddf58

  • SHA512

    b57596af04e277d9aab902ff702629f361be62553b83a7a1cfe3354f5305153e49fb7bdccfa500ed06fd82b398c9f529cf20e05ec005b7c497f3b11cbe204cd1

  • SSDEEP

    12288:DXOqjdBB1SUhySAgRsZOWuw6CCVSKsUtrorfAEyZ8kbn:DpB1dhTs0jcsSKDifBqlb

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 17 IoCs
  • Drops file in Windows directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 47 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f8a1f8aadd4147e3edf64c3b918cd82f.exe
    "C:\Users\Admin\AppData\Local\Temp\f8a1f8aadd4147e3edf64c3b918cd82f.exe"
    1⤵
    • Adds Run key to start application
    • Writes to the Master Boot Record (MBR)
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4188
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32/a1l8.dll"
      2⤵
        PID:4008
      • C:\Windows\SysWOW64\regsvr32.exe
        C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32/b34o.dll"
        2⤵
          PID:2488
        • C:\Windows\SysWOW64\341d.exe
          C:\Windows\system32/341d.exe -i
          2⤵
          • Executes dropped EXE
          PID:3708
        • C:\Windows\SysWOW64\341d.exe
          C:\Windows\system32/341d.exe -s
          2⤵
          • Executes dropped EXE
          PID:3040
        • C:\Windows\SysWOW64\regsvr32.exe
          C:\Windows\system32\regsvr32.exe /s "C:\Windows\system32/b34o.dll"
          2⤵
          • Loads dropped DLL
          • Installs/modifies Browser Helper Object
          • Modifies registry class
          PID:1172
        • C:\Windows\SysWOW64\regsvr32.exe
          C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32/4f3r.dll"
          2⤵
            PID:4512
          • C:\Windows\SysWOW64\regsvr32.exe
            C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32/b4cb.dll"
            2⤵
              PID:4580
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\system32\rundll32 C:\Windows\system32/341e.dll, Always
              2⤵
                PID:4888
              • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\mtv.exe
                C:\Users\Admin\AppData\Local\Temp\h8nil4o8\mtv.exe
                2⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • Suspicious use of SetWindowsHookEx
                PID:5048
            • C:\Windows\SysWOW64\341d.exe
              C:\Windows\SysWOW64\341d.exe
              1⤵
              • Drops file in Drivers directory
              • Executes dropped EXE
              • Loads dropped DLL
              • Writes to the Master Boot Record (MBR)
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:2188
              • C:\Windows\SysWOW64\rundll32.exe
                C:\Windows\system32\rundll32 C:\Windows\system32/341e.dll,Always
                2⤵
                • Loads dropped DLL
                PID:3488

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\b3tregg\tmp.exe

              Filesize

              108KB

              MD5

              deab2480ea0be54cf7b0c0446309ba43

              SHA1

              97cdd5629b4bfd28e2670ead296b249a7dcfeafd

              SHA256

              575d09c1b1f665038a2af6a068e19e7200f0ed707fc6632598125bdd6206a801

              SHA512

              3f8c5e5e47b463b1ba2f85af1c9f8b898dab294f8e7b3b6380d3b00d1c3d5771c746b38409a2736411d0e1d73c7acb6df6005502c86441d11d1b39c28652b01a

            • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\b.dll

              Filesize

              116KB

              MD5

              74331bf70a4564fbb2d47d8ab5d5a6ae

              SHA1

              33b64d7939fcd7878e1d879c4e4bf14e79cd4aaa

              SHA256

              18a066be2612b2cd173c83dc79f4fe478b878f1ad68749f3a0634969d0a726ac

              SHA512

              f8a03a0a84bef01a881e502789aebda5b80ecb0f7528188b14443d2307be1f864828f259ec064f48b4630f388f4f6241b5d9b8b78ca25cd7794bd161ffcb6ac2

            • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\mtv.exe

              Filesize

              48KB

              MD5

              b9679465d03a2a6efed9d51ac8a4b062

              SHA1

              7ebfa96092246e85e8df23f2b09a688bf9331e3a

              SHA256

              8c376a377ba006623cd787099a5149e35c2d1d6babe085eabf5a104f6c7f99a2

              SHA512

              2faeb3cea29574c18401d386e621ef8e300c09ca7a9a7d3260dc3a964224497f40fe19e2d72623b994c63e5fe7a6244b2588b7d39424ac85fb43ec4ece2892e5

            • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\p.dll

              Filesize

              156KB

              MD5

              196f8b9ed851fbcee1ec295701cf5ff2

              SHA1

              16ff7c8205aa6bcf40ec1e2be98e72bfee69e654

              SHA256

              45f380d68ab9cdd287810d23b97231094ea0a710ac9a2ce7b7ca356a9eb22666

              SHA512

              54b89fee75032df1f7b60192fb24bc8d8ba5bed262ea637726d8abb4c8f1b0638199cf8e76df36323e0d52b371f8cfd51c78c4f584397688bc7be09ce9a3e81d

            • C:\Windows\SysWOW64\341d.exe

              Filesize

              212KB

              MD5

              9331e8e6e2eef0f4aa01e616992f0095

              SHA1

              71ec5a87a625a1187211aa2bf7879dd3e394e3aa

              SHA256

              52489b87bf26bf9cf9360d09debce83ecfef43e9129c803338fc15421f0bcc9a

              SHA512

              7c023dd0ff66a1f2803b5e251f75876d8cc7f9fabcf81748852fbb061b714f2fd4b240e86a9d696fd4cadde30cf7b8713972888b820a594489cd852a0355fb20

            • C:\Windows\SysWOW64\341e.dll

              Filesize

              92KB

              MD5

              a9ba46f2bdc9ba937e0ddda9bc14c1db

              SHA1

              7b3219d8af38ccbe2a879af83a0d6ef9e24c187d

              SHA256

              878e418a38e8f5c09c5d304cf95226c374249cf42d34d2c14ca2007f84d6bb43

              SHA512

              defbf95b9869432f34124bf33d0c04dce6bdfc9253a6333e658c7ce8549e75ce56af10a92bd21799158f26df1630169fea7b4f936d21cdbaa0b84716446e3137

            • C:\Windows\SysWOW64\341e.dll

              Filesize

              414KB

              MD5

              bf15137bec13b9d0a21c6213f3cf6955

              SHA1

              0a40e703fb48f8262d44f5df82e69cacf15ceddf

              SHA256

              a1854087f6e387c8119d89f23177ecdf0fe66883513a6f5102afc9d63c8484f9

              SHA512

              8972e5df2a213e645623ad97e2455dbe2af7033de2248d953f4e2de8c4e0ae90b1607997946cc7447ab7f339d6a585da4df961d5c875e16d6f9bbd465d55bf4d

            • C:\Windows\SysWOW64\341e.dll

              Filesize

              381KB

              MD5

              b6f3593b90ebf60b7ad458bdd5e50ee1

              SHA1

              fd317f0f22aa1ff840a1ba9bbea66ad21b7f0ba0

              SHA256

              bc014f6984727c305c678b9ddb9dc5d3de589bf33d558b7872d0451920ba1bd8

              SHA512

              080429e3e38f927c0ad47dbfa52f6038486e8484825bdda446db66b66421f3e5bed5bbe1df3104546a01d9226d19467192815b2bb79574be3e52edc8ed6fca05

            • C:\Windows\SysWOW64\b34o.dll

              Filesize

              57KB

              MD5

              84f8de83a85fd773a80a941ecf0eca71

              SHA1

              a740d5006f5c8e564d5b4b8e205bb629913de1a7

              SHA256

              ca78e5431a03f66cfb32f6881393b2182eb09a0480147a31bc2405cd8ffa2e5c

              SHA512

              798bc5be932c6f3ea90bf5820c0f0e2928366b46e95a67221e104d62080b110560d86cc441593e9f3dd6656fcbadf626d9a5fa44b534fe3bda21960154114602

            • C:\Windows\SysWOW64\b34o.dll

              Filesize

              59KB

              MD5

              071f5a7e468e5d5905b7b720e666f777

              SHA1

              4096f78888cc2c07bdd40beea4a899ba293b0943

              SHA256

              0d8ba787d8bdc2cd16ccfc0a8bcd1cc6eab3674892c6cb775bc2da68fcdc6ca9

              SHA512

              886025636bba84cd43fb4d87588047bcbd996542516dadf723936030335ed337c421a6c41b5366b3eb5826085c30cb9bd555dd1246e5631ee41b722c3e528797

            • C:\Windows\SysWOW64\b34o.dll

              Filesize

              92KB

              MD5

              71600a3413990065147572e4404bf809

              SHA1

              51e16f1ec11e8e91322919656fc11bc35ff37d87

              SHA256

              39bfe315146ae20fd8dffdd38769484ce560d00ab81ddbbb392fa97634f583da

              SHA512

              96ebcaaede059dcb7e14cb50087a9976f26cd950e19f59ddd4d0daac8809e11c3b188b02ae5e6f7845da479715c6b90e4b92c97a8a605a3f3ea92eea905a4ccd