Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 19:40
Static task
static1
Behavioral task
behavioral1
Sample
020711333fb8898672a822c9af9694b9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
020711333fb8898672a822c9af9694b9.exe
Resource
win10v2004-20231215-en
General
-
Target
020711333fb8898672a822c9af9694b9.exe
-
Size
412KB
-
MD5
020711333fb8898672a822c9af9694b9
-
SHA1
9e933fbb03338c72640a8ebf817513be5c40b895
-
SHA256
e81a4de91012529f67d65116b5690b6a50aa287beb32054c69d479ad1f85c0a8
-
SHA512
17842a4477db9c0971a28a76b6b4c4868654c9859d1e40de5a9da9e9b68f0705f14d29cc38073fdc1442e2dbbb676de6893b7991a37c9025c5ee402d38ea8d97
-
SSDEEP
12288:v33Q9q2bGVy/GSX3B9SiGf5NuiVMDsSWzDIw:v3bcGUXxng56tw
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts bffd.exe -
Executes dropped EXE 3 IoCs
pid Process 3920 bffd.exe 500 bffd.exe 4728 bffd.exe -
Loads dropped DLL 30 IoCs
pid Process 1312 regsvr32.exe 4728 bffd.exe 4668 rundll32.exe 4804 rundll32.exe 4728 bffd.exe 4728 bffd.exe 4728 bffd.exe 4728 bffd.exe 4728 bffd.exe 4728 bffd.exe 4728 bffd.exe 4728 bffd.exe 4728 bffd.exe 4728 bffd.exe 4728 bffd.exe 4728 bffd.exe 4728 bffd.exe 4728 bffd.exe 4728 bffd.exe 4728 bffd.exe 4728 bffd.exe 4728 bffd.exe 4728 bffd.exe 4728 bffd.exe 4728 bffd.exe 4728 bffd.exe 4728 bffd.exe 4728 bffd.exe 4728 bffd.exe 4728 bffd.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\ = "winhome" regsvr32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 020711333fb8898672a822c9af9694b9.exe File opened for modification \??\PhysicalDrive0 bffd.exe File opened for modification \??\PhysicalDrive0 rundll32.exe -
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\SysWOW64\0a3 rundll32.exe File opened for modification C:\Windows\SysWOW64\a1l8.dlltmp 020711333fb8898672a822c9af9694b9.exe File opened for modification C:\Windows\SysWOW64\34ua.exe 020711333fb8898672a822c9af9694b9.exe File opened for modification C:\Windows\SysWOW64\144d.exe 020711333fb8898672a822c9af9694b9.exe File opened for modification C:\Windows\SysWOW64\8b4o.dll 020711333fb8898672a822c9af9694b9.exe File created C:\Windows\SysWOW64\11512112-39 rundll32.exe File opened for modification C:\Windows\SysWOW64\a1l8.dll 020711333fb8898672a822c9af9694b9.exe File opened for modification C:\Windows\SysWOW64\b4cb.dll 020711333fb8898672a822c9af9694b9.exe File opened for modification C:\Windows\SysWOW64\bffd.exe 020711333fb8898672a822c9af9694b9.exe File opened for modification C:\Windows\SysWOW64\8b4o.dlltmp 020711333fb8898672a822c9af9694b9.exe File opened for modification C:\Windows\SysWOW64\3bef.dll 020711333fb8898672a822c9af9694b9.exe File opened for modification C:\Windows\SysWOW64\1ba4.dll 020711333fb8898672a822c9af9694b9.exe File opened for modification C:\Windows\SysWOW64\b4cb.dlltmp 020711333fb8898672a822c9af9694b9.exe File opened for modification C:\Windows\SysWOW64\b3fs.dll 020711333fb8898672a822c9af9694b9.exe File opened for modification C:\Windows\SysWOW64\4f3r.dll 020711333fb8898672a822c9af9694b9.exe File opened for modification C:\Windows\SysWOW64\4f3r.dlltmp 020711333fb8898672a822c9af9694b9.exe File opened for modification C:\Windows\SysWOW64\841e.dll 020711333fb8898672a822c9af9694b9.exe File opened for modification C:\Windows\SysWOW64\14rb.exe 020711333fb8898672a822c9af9694b9.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File opened for modification C:\Windows\8f6.exe 020711333fb8898672a822c9af9694b9.exe File opened for modification C:\Windows\f6fu.bmp 020711333fb8898672a822c9af9694b9.exe File created C:\Windows\Tasks\ms.job 020711333fb8898672a822c9af9694b9.exe File opened for modification C:\Windows\a34b.flv 020711333fb8898672a822c9af9694b9.exe File opened for modification C:\Windows\a8fd.flv 020711333fb8898672a822c9af9694b9.exe File opened for modification C:\Windows\f6f.bmp 020711333fb8898672a822c9af9694b9.exe File opened for modification C:\Windows\a8f.flv 020711333fb8898672a822c9af9694b9.exe File opened for modification C:\Windows\a8fd.exe 020711333fb8898672a822c9af9694b9.exe File opened for modification C:\Windows\4bad.flv 020711333fb8898672a822c9af9694b9.exe File opened for modification C:\Windows\bf14.bmp 020711333fb8898672a822c9af9694b9.exe File opened for modification C:\Windows\14ba.exe 020711333fb8898672a822c9af9694b9.exe File opened for modification C:\Windows\6f1u.bmp 020711333fb8898672a822c9af9694b9.exe File opened for modification C:\Windows\8f6d.exe 020711333fb8898672a822c9af9694b9.exe -
Modifies registry class 47 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C}\TypeLib\ = "{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C}\TypeLib\ = "{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\ = "CFunPlayer Object" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\VersionIndependentProgID\ = "BHO.FunPlayer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D}\1.0\ = "BHO 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer.1\CLSID\ = "{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\CurVer\ = "BHO.FunPlayer.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\ProgID\ = "BHO.FunPlayer.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\AppID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\CLSID\ = "{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\InprocServer32\ThreadingModel = "apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\InprocServer32\ = "C:\\Windows\\SysWow64\\8b4o.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\TypeLib\ = "{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\8b4o.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer.1\ = "CFunPlayer Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\ = "CFunPlayer Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D}\1.0\HELPDIR\ = "C:\\Windows\\SysWow64\\" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C}\ = "IFunPlayer" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C}\ = "IFunPlayer" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C}\TypeLib regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4728 bffd.exe 4728 bffd.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2052 wrote to memory of 4188 2052 020711333fb8898672a822c9af9694b9.exe 88 PID 2052 wrote to memory of 4188 2052 020711333fb8898672a822c9af9694b9.exe 88 PID 2052 wrote to memory of 4188 2052 020711333fb8898672a822c9af9694b9.exe 88 PID 2052 wrote to memory of 4812 2052 020711333fb8898672a822c9af9694b9.exe 89 PID 2052 wrote to memory of 4812 2052 020711333fb8898672a822c9af9694b9.exe 89 PID 2052 wrote to memory of 4812 2052 020711333fb8898672a822c9af9694b9.exe 89 PID 2052 wrote to memory of 2288 2052 020711333fb8898672a822c9af9694b9.exe 91 PID 2052 wrote to memory of 2288 2052 020711333fb8898672a822c9af9694b9.exe 91 PID 2052 wrote to memory of 2288 2052 020711333fb8898672a822c9af9694b9.exe 91 PID 2052 wrote to memory of 2796 2052 020711333fb8898672a822c9af9694b9.exe 92 PID 2052 wrote to memory of 2796 2052 020711333fb8898672a822c9af9694b9.exe 92 PID 2052 wrote to memory of 2796 2052 020711333fb8898672a822c9af9694b9.exe 92 PID 2052 wrote to memory of 1312 2052 020711333fb8898672a822c9af9694b9.exe 94 PID 2052 wrote to memory of 1312 2052 020711333fb8898672a822c9af9694b9.exe 94 PID 2052 wrote to memory of 1312 2052 020711333fb8898672a822c9af9694b9.exe 94 PID 2052 wrote to memory of 3920 2052 020711333fb8898672a822c9af9694b9.exe 95 PID 2052 wrote to memory of 3920 2052 020711333fb8898672a822c9af9694b9.exe 95 PID 2052 wrote to memory of 3920 2052 020711333fb8898672a822c9af9694b9.exe 95 PID 2052 wrote to memory of 500 2052 020711333fb8898672a822c9af9694b9.exe 97 PID 2052 wrote to memory of 500 2052 020711333fb8898672a822c9af9694b9.exe 97 PID 2052 wrote to memory of 500 2052 020711333fb8898672a822c9af9694b9.exe 97 PID 4728 wrote to memory of 4668 4728 bffd.exe 100 PID 4728 wrote to memory of 4668 4728 bffd.exe 100 PID 4728 wrote to memory of 4668 4728 bffd.exe 100 PID 2052 wrote to memory of 4804 2052 020711333fb8898672a822c9af9694b9.exe 101 PID 2052 wrote to memory of 4804 2052 020711333fb8898672a822c9af9694b9.exe 101 PID 2052 wrote to memory of 4804 2052 020711333fb8898672a822c9af9694b9.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\020711333fb8898672a822c9af9694b9.exe"C:\Users\Admin\AppData\Local\Temp\020711333fb8898672a822c9af9694b9.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\a1l8.dll"2⤵PID:4188
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\b4cb.dll"2⤵PID:4812
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\4f3r.dll"2⤵PID:2288
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\8b4o.dll"2⤵PID:2796
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Windows\system32\8b4o.dll"2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:1312
-
-
C:\Windows\SysWOW64\bffd.exeC:\Windows\system32\bffd.exe -i2⤵
- Executes dropped EXE
PID:3920
-
-
C:\Windows\SysWOW64\bffd.exeC:\Windows\system32\bffd.exe -s2⤵
- Executes dropped EXE
PID:500
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32 C:\Windows\system32\841e.dll, Always2⤵
- Loads dropped DLL
PID:4804
-
-
C:\Windows\SysWOW64\bffd.exeC:\Windows\SysWOW64\bffd.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32 C:\Windows\system32\841e.dll,Always2⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:4668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
159KB
MD53b710c6c363b131dcbed1f417b6332f1
SHA113acdeb0f08c90071584b71a8020a5662751e178
SHA256788e86de5e8080b7938af6640fd49833a406453eb806b1b817ae442d1a2c8e32
SHA512a6c816cb23e6cffc841235c5e38775a29d7a45913a14a7eba7831d8c4c4051de6d52bc50c9e251a4a6e9b656b23586f38c370f9c5b23b5d311c98ce72289d074
-
Filesize
229KB
MD536899723f2124fa6d89e2df5565c73db
SHA1b8dd7df5c0da017cf88ad6fad77407cd1d80b317
SHA2565e441acd8cf8cc0edc48112bd384e85454ea6065757013fa67554e41b0aabe4f
SHA512dd870b3173508c6ad02b7f78e2515d1493e7da90f8568d08e40d09221365f170bedffda475819900dbb9d3a4f8f0e58f2cc98be905e8f4d2fca719106b4650cb
-
Filesize
104KB
MD5c078a3539c6201d385a8d4bd2c79d77e
SHA1f18b6b7c325d0528ce1bf9d3d99f40d3abbf5ace
SHA256e6f634d944f000d64e823b9ef3d8a178700024e32ac696275a9e2927a8568eee
SHA512ae6fe604eaf179866bd982b7ea518e7b1f9e0d7f8fcd91358d189a3d1b947977c4a85b1233af30615d99fef78450f9bd4cc2fec47538d813732a98d4b1ce84ee