Overview
overview
10Static
static
8BuhtaClient.vbs
windows7-x64
1BuhtaClient.vbs
windows10-2004-x64
1BuhtaClient.exe
windows7-x64
10BuhtaClient.exe
windows10-2004-x64
10BuhtaDev.chm
windows7-x64
1BuhtaDev.chm
windows10-2004-x64
1BuhtaPivot.xls
windows7-x64
1BuhtaPivot.xls
windows10-2004-x64
1BuhtaServer.exe
windows7-x64
1BuhtaServer.exe
windows10-2004-x64
1PivotInstall.exe
windows7-x64
1PivotInstall.exe
windows10-2004-x64
1dsd.exe
windows7-x64
1dsd.exe
windows10-2004-x64
1eapi.dll
windows7-x64
3eapi.dll
windows10-2004-x64
3quricol32.dll
windows7-x64
1quricol32.dll
windows10-2004-x64
3Analysis
-
max time kernel
141s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 00:15
Behavioral task
behavioral1
Sample
BuhtaClient.vbs
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
BuhtaClient.vbs
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
BuhtaClient.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
BuhtaClient.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
BuhtaDev.chm
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
BuhtaDev.chm
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
BuhtaPivot.xls
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
BuhtaPivot.xls
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
BuhtaServer.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
BuhtaServer.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
PivotInstall.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
PivotInstall.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
dsd.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
dsd.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
eapi.dll
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
eapi.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
quricol32.dll
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
quricol32.dll
Resource
win10v2004-20231222-en
General
-
Target
BuhtaClient.exe
-
Size
12.9MB
-
MD5
c82005128e4de1cad09fbde5fdef3290
-
SHA1
f4cfb7e40efb4a2a74ef734cb7dc0b70d2348ab4
-
SHA256
612a2dcda3fcec5e2b4e0ca7c6f99952ef9274a482445c439261597884db5848
-
SHA512
622d8f81193d57c30ffa12b8f3d4ada6d52d6fe229d2b0a9b6fe79f52dd531ecc25334d2016204e943efe1060267aa323d446b88d783fd4e20b68fbc88af2d13
-
SSDEEP
196608:tenHQWQw5KP+4OQF51fa51F5zttrD2VmfXooAl2qSzTfv6YbKaqKpIPuS/HCQ:t+D5Kmk1CPz7rqvl2qS3X7ld
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader First Stage 5 IoCs
resource yara_rule behavioral3/memory/1140-2-0x0000000000400000-0x0000000002D0B000-memory.dmp modiloader_stage1 behavioral3/memory/1140-3-0x0000000000400000-0x0000000002D0B000-memory.dmp modiloader_stage1 behavioral3/memory/1140-4-0x0000000000400000-0x0000000002D0B000-memory.dmp modiloader_stage1 behavioral3/memory/1140-5-0x0000000000400000-0x0000000002D0B000-memory.dmp modiloader_stage1 behavioral3/memory/1140-6-0x0000000000400000-0x0000000002D0B000-memory.dmp modiloader_stage1 -
Program crash 1 IoCs
pid pid_target Process procid_target 2852 1140 WerFault.exe 23 -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{88861623-2B95-4BE1-B165-AACA7B43A353}\LocalServer32 BuhtaClient.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bmProject.EventSupportBMPro\Clsid BuhtaClient.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{88861623-2B95-4BE1-B165-AACA7B43A353}\ProgID BuhtaClient.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{88861623-2B95-4BE1-B165-AACA7B43A353}\ProgID\ = "bmProject.EventSupportBMPro" BuhtaClient.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{88861623-2B95-4BE1-B165-AACA7B43A353}\Version BuhtaClient.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{88861623-2B95-4BE1-B165-AACA7B43A353}\Version\ = "1.0" BuhtaClient.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{88861623-2B95-4BE1-B165-AACA7B43A353} BuhtaClient.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bmProject.EventSupportBMPro\ = "Ïðîãðàììà ÁÓÕòà 1.0" BuhtaClient.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bmProject.EventSupportBMPro\Clsid\ = "{88861623-2B95-4BE1-B165-AACA7B43A353}" BuhtaClient.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bmProject.EventSupportBMPro BuhtaClient.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{88861623-2B95-4BE1-B165-AACA7B43A353}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\BuhtaClient.exe /bmProjectPivotExcelModule" BuhtaClient.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{88861623-2B95-4BE1-B165-AACA7B43A353}\TypeLib BuhtaClient.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{88861623-2B95-4BE1-B165-AACA7B43A353}\TypeLib\ = "{655F813B-DED0-4053-AB5C-2250F76AB966}" BuhtaClient.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{88861623-2B95-4BE1-B165-AACA7B43A353}\ = "Ïðîãðàììà ÁÓÕòà 1.0" BuhtaClient.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1140 BuhtaClient.exe 1140 BuhtaClient.exe 1140 BuhtaClient.exe 1140 BuhtaClient.exe 1140 BuhtaClient.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1140 wrote to memory of 2664 1140 BuhtaClient.exe 28 PID 1140 wrote to memory of 2664 1140 BuhtaClient.exe 28 PID 1140 wrote to memory of 2664 1140 BuhtaClient.exe 28 PID 1140 wrote to memory of 2664 1140 BuhtaClient.exe 28 PID 1140 wrote to memory of 2852 1140 BuhtaClient.exe 30 PID 1140 wrote to memory of 2852 1140 BuhtaClient.exe 30 PID 1140 wrote to memory of 2852 1140 BuhtaClient.exe 30 PID 1140 wrote to memory of 2852 1140 BuhtaClient.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\BuhtaClient.exe"C:\Users\Admin\AppData\Local\Temp\BuhtaClient.exe"1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1140 -s 7362⤵
- Program crash
PID:2852
-