Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-02-2024 13:41
Static task
static1
Behavioral task
behavioral1
Sample
a1fdd1e367851bbd91cdde603d10d4b9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a1fdd1e367851bbd91cdde603d10d4b9.exe
Resource
win10v2004-20240221-en
General
-
Target
a1fdd1e367851bbd91cdde603d10d4b9.exe
-
Size
552KB
-
MD5
a1fdd1e367851bbd91cdde603d10d4b9
-
SHA1
2b0f640b54ea44b7c59b31b7eb0c08e233ee4876
-
SHA256
883d51c41271cd28a3b20969f14789c13bc5f7971f884013e84fc8d1f54f7304
-
SHA512
8311f900beb589902ef014d385525a7728bce2154e6d24c9aa8f6ab8a988aa5aea64d10fa6d056f99995ba5f846ceb611df887056d15a27a6a266438433a6496
-
SSDEEP
12288:2JupwI3iV2ENXh2mqBMDMe8BZqW9vg/ddK32s/QjkOSR2QaY:2PI3Q2yh27M0ZB0d+QjkjQm
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts bffd.exe -
Executes dropped EXE 3 IoCs
pid Process 2460 bffd.exe 2488 bffd.exe 2396 bffd.exe -
Loads dropped DLL 48 IoCs
pid Process 2892 regsvr32.exe 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 2460 bffd.exe 2460 bffd.exe 2460 bffd.exe 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 2488 bffd.exe 2488 bffd.exe 2488 bffd.exe 2396 bffd.exe 2632 rundll32.exe 472 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 472 rundll32.exe 472 rundll32.exe 472 rundll32.exe 2632 rundll32.exe 2396 bffd.exe 2396 bffd.exe 2396 bffd.exe 2396 bffd.exe 2396 bffd.exe 2396 bffd.exe 2396 bffd.exe 2396 bffd.exe 2396 bffd.exe 2396 bffd.exe 2396 bffd.exe 2396 bffd.exe 2396 bffd.exe 2396 bffd.exe 2396 bffd.exe 2396 bffd.exe 2396 bffd.exe 2396 bffd.exe 2396 bffd.exe 2396 bffd.exe 2396 bffd.exe 2396 bffd.exe 2396 bffd.exe 2396 bffd.exe 2396 bffd.exe 2396 bffd.exe 2396 bffd.exe 2396 bffd.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{ED493CC4-E87B-4D8C-AC59-2A87A14237A0} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{ED493CC4-E87B-4D8C-AC59-2A87A14237A0}\ = "Microsoft User" regsvr32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification \??\PhysicalDrive0 bffd.exe File opened for modification \??\PhysicalDrive0 rundll32.exe -
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\14rb.exe a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\SysWOW64\b4cb.dlltmp a1fdd1e367851bbd91cdde603d10d4b9.exe File created C:\Windows\SysWOW64\6473-79-103 rundll32.exe File opened for modification C:\Windows\SysWOW64\34ua.exe a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\SysWOW64\8b4o.dll a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\SysWOW64\bffd.exe a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\SysWOW64\8b4o.dlltmp a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\SysWOW64\a1l8.dlltmp a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\SysWOW64\1ba4.dll a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\SysWOW64\b4cb.dll a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\SysWOW64\b3fs.dll a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\SysWOW64\4f3r.dll a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\SysWOW64\3bef.dll a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\SysWOW64\a1l8.dll a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\SysWOW64\144d.exe a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\SysWOW64\4f3r.dlltmp a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\SysWOW64\841e.dll a1fdd1e367851bbd91cdde603d10d4b9.exe File created C:\Windows\SysWOW64\2304 rundll32.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File opened for modification C:\Windows\a8f.flv a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\8f6d.exe a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\f6f.bmp a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\8f6.exe a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\6f1u.bmp a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\a8fd.flv a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\bf14.bmp a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\14ba.exe a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\a34b.flv a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\f6fu.bmp a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\a8fd.exe a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\4bad.flv a1fdd1e367851bbd91cdde603d10d4b9.exe File created C:\Windows\Tasks\ms.job a1fdd1e367851bbd91cdde603d10d4b9.exe -
Modifies registry class 47 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer.1\ = "CFunPlayer Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5CC0BADE-4049-4B84-B998-D1AD4D7B9C44}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5CC0BADE-4049-4B84-B998-D1AD4D7B9C44}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5CC0BADE-4049-4B84-B998-D1AD4D7B9C44}\TypeLib\ = "{797AD939-E96C-43E1-ACBD-778DFFD8748C}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\ = "CFunPlayer Object" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\CurVer\ = "BHO.FunPlayer.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ED493CC4-E87B-4D8C-AC59-2A87A14237A0}\ = "CFunPlayer Object" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ED493CC4-E87B-4D8C-AC59-2A87A14237A0}\ProgID\ = "BHO.FunPlayer.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ED493CC4-E87B-4D8C-AC59-2A87A14237A0}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ED493CC4-E87B-4D8C-AC59-2A87A14237A0}\InprocServer32\ = "C:\\Windows\\SysWow64\\8b4o.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{797AD939-E96C-43E1-ACBD-778DFFD8748C}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ED493CC4-E87B-4D8C-AC59-2A87A14237A0} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ED493CC4-E87B-4D8C-AC59-2A87A14237A0}\AppID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{797AD939-E96C-43E1-ACBD-778DFFD8748C}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{797AD939-E96C-43E1-ACBD-778DFFD8748C}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{797AD939-E96C-43E1-ACBD-778DFFD8748C}\1.0\HELPDIR\ = "C:\\Windows\\SysWow64\\" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5CC0BADE-4049-4B84-B998-D1AD4D7B9C44} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5CC0BADE-4049-4B84-B998-D1AD4D7B9C44}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer.1\CLSID\ = "{ED493CC4-E87B-4D8C-AC59-2A87A14237A0}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ED493CC4-E87B-4D8C-AC59-2A87A14237A0}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{797AD939-E96C-43E1-ACBD-778DFFD8748C} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{797AD939-E96C-43E1-ACBD-778DFFD8748C}\1.0\ = "BHO 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{797AD939-E96C-43E1-ACBD-778DFFD8748C}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5CC0BADE-4049-4B84-B998-D1AD4D7B9C44} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5CC0BADE-4049-4B84-B998-D1AD4D7B9C44}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5CC0BADE-4049-4B84-B998-D1AD4D7B9C44}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ED493CC4-E87B-4D8C-AC59-2A87A14237A0}\VersionIndependentProgID\ = "BHO.FunPlayer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{797AD939-E96C-43E1-ACBD-778DFFD8748C}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{797AD939-E96C-43E1-ACBD-778DFFD8748C}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\8b4o.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5CC0BADE-4049-4B84-B998-D1AD4D7B9C44}\ = "IFunPlayer" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5CC0BADE-4049-4B84-B998-D1AD4D7B9C44}\ = "IFunPlayer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ED493CC4-E87B-4D8C-AC59-2A87A14237A0}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5CC0BADE-4049-4B84-B998-D1AD4D7B9C44}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5CC0BADE-4049-4B84-B998-D1AD4D7B9C44}\TypeLib\ = "{797AD939-E96C-43E1-ACBD-778DFFD8748C}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5CC0BADE-4049-4B84-B998-D1AD4D7B9C44}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5CC0BADE-4049-4B84-B998-D1AD4D7B9C44}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\CLSID\ = "{ED493CC4-E87B-4D8C-AC59-2A87A14237A0}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ED493CC4-E87B-4D8C-AC59-2A87A14237A0}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ED493CC4-E87B-4D8C-AC59-2A87A14237A0}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ED493CC4-E87B-4D8C-AC59-2A87A14237A0}\InprocServer32\ThreadingModel = "apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ED493CC4-E87B-4D8C-AC59-2A87A14237A0}\TypeLib\ = "{797AD939-E96C-43E1-ACBD-778DFFD8748C}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{797AD939-E96C-43E1-ACBD-778DFFD8748C}\1.0\FLAGS regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2396 bffd.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2564 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 28 PID 2884 wrote to memory of 2564 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 28 PID 2884 wrote to memory of 2564 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 28 PID 2884 wrote to memory of 2564 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 28 PID 2884 wrote to memory of 2564 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 28 PID 2884 wrote to memory of 2564 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 28 PID 2884 wrote to memory of 2564 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 28 PID 2884 wrote to memory of 2540 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 29 PID 2884 wrote to memory of 2540 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 29 PID 2884 wrote to memory of 2540 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 29 PID 2884 wrote to memory of 2540 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 29 PID 2884 wrote to memory of 2540 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 29 PID 2884 wrote to memory of 2540 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 29 PID 2884 wrote to memory of 2540 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 29 PID 2884 wrote to memory of 2824 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 31 PID 2884 wrote to memory of 2824 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 31 PID 2884 wrote to memory of 2824 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 31 PID 2884 wrote to memory of 2824 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 31 PID 2884 wrote to memory of 2824 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 31 PID 2884 wrote to memory of 2824 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 31 PID 2884 wrote to memory of 2824 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 31 PID 2884 wrote to memory of 2420 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 30 PID 2884 wrote to memory of 2420 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 30 PID 2884 wrote to memory of 2420 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 30 PID 2884 wrote to memory of 2420 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 30 PID 2884 wrote to memory of 2420 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 30 PID 2884 wrote to memory of 2420 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 30 PID 2884 wrote to memory of 2420 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 30 PID 2884 wrote to memory of 2892 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 32 PID 2884 wrote to memory of 2892 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 32 PID 2884 wrote to memory of 2892 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 32 PID 2884 wrote to memory of 2892 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 32 PID 2884 wrote to memory of 2892 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 32 PID 2884 wrote to memory of 2892 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 32 PID 2884 wrote to memory of 2892 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 32 PID 2884 wrote to memory of 2460 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 33 PID 2884 wrote to memory of 2460 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 33 PID 2884 wrote to memory of 2460 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 33 PID 2884 wrote to memory of 2460 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 33 PID 2884 wrote to memory of 2460 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 33 PID 2884 wrote to memory of 2460 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 33 PID 2884 wrote to memory of 2460 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 33 PID 2884 wrote to memory of 2488 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 36 PID 2884 wrote to memory of 2488 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 36 PID 2884 wrote to memory of 2488 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 36 PID 2884 wrote to memory of 2488 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 36 PID 2884 wrote to memory of 2488 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 36 PID 2884 wrote to memory of 2488 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 36 PID 2884 wrote to memory of 2488 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 36 PID 2884 wrote to memory of 472 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 38 PID 2884 wrote to memory of 472 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 38 PID 2884 wrote to memory of 472 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 38 PID 2884 wrote to memory of 472 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 38 PID 2884 wrote to memory of 472 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 38 PID 2884 wrote to memory of 472 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 38 PID 2884 wrote to memory of 472 2884 a1fdd1e367851bbd91cdde603d10d4b9.exe 38 PID 2396 wrote to memory of 2632 2396 bffd.exe 39 PID 2396 wrote to memory of 2632 2396 bffd.exe 39 PID 2396 wrote to memory of 2632 2396 bffd.exe 39 PID 2396 wrote to memory of 2632 2396 bffd.exe 39 PID 2396 wrote to memory of 2632 2396 bffd.exe 39 PID 2396 wrote to memory of 2632 2396 bffd.exe 39 PID 2396 wrote to memory of 2632 2396 bffd.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1fdd1e367851bbd91cdde603d10d4b9.exe"C:\Users\Admin\AppData\Local\Temp\a1fdd1e367851bbd91cdde603d10d4b9.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\a1l8.dll"2⤵PID:2564
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\b4cb.dll"2⤵PID:2540
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\8b4o.dll"2⤵PID:2420
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\4f3r.dll"2⤵PID:2824
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Windows\system32\8b4o.dll"2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2892
-
-
C:\Windows\SysWOW64\bffd.exeC:\Windows\system32\bffd.exe -i2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2460
-
-
C:\Windows\SysWOW64\bffd.exeC:\Windows\system32\bffd.exe -s2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2488
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32 C:\Windows\system32\841e.dll, Always2⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:472
-
-
C:\Windows\SysWOW64\bffd.exeC:\Windows\SysWOW64\bffd.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32 C:\Windows\system32\841e.dll,Always2⤵
- Loads dropped DLL
PID:2632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD564d61fd417c364bee35936e4df51ee9f
SHA1429fcba754a0c39c5da153fd72b451459b08abbc
SHA256c629d5be3611dfbb39565590fb6583059405b31f78ae6e58a644717a809745c7
SHA512f885db1d7923a24c26c18918dc75c0c9f43361cc9d38633c595753e2fb435c434599815a25e3d068709f19392b66977289adae14fe77b29e9abe7869acfe022a
-
Filesize
412KB
MD5bf17c7d9010da0d8bc1f21acf3a80e95
SHA103189303609a2fed6f5e07f45a4477d0af64334b
SHA25663f8092073ab4ac4c2617c39462315134143a17c3bed56ad87dd00a9ec2ac4d2
SHA5123345114b985cd3347eee9cdc749b9560a1f3e1d5f00db2a1d1f7e1962438c13ce2012bea13932debf28c7f637450e6820b2615352c627018fdcd6904ff5aa0a0
-
Filesize
120KB
MD5db32ce0a471f00c353b1cb1a650dbae0
SHA1478fa371650158712aba22eefd461238bbc55408
SHA256a917e388e3dd22744a16112ba410281ebc5e6b0010f560cd5f7bbf2388e9e02e
SHA512c0aa83595d4e20c79c9ec72fe6aab0fcb4fe3e3035a74313c0c9edddec9a47fb8858afc1fba33c9d784b7a54550e5652d7256e36abd6c631c5d2a68725f71ae5
-
Filesize
62KB
MD5d0d2a8ecfeb237f431dc559af1bfcfbb
SHA18731a6ea694fa37d19ad329b5832102a1640e131
SHA25657bf8f4606b7bbc38651e2d6523e736eb943d8bf7b9040d14412e34ebe2282f7
SHA512b22b4a2ca527ea48e171212f0e8d2c48ab92b7960cfd85fffaed731f7bb3f3a3ace6f3b003fcc2a017b836ed38b30acce94b18f987d14e6c68b5fd5df96c186f
-
Filesize
31KB
MD5dabcecfd3d856e6f1fdbaa38f20c447e
SHA14137df5f3d4d62f3361fbc940ebcd091a3141853
SHA256ac9390bcb93b0fe2b60071644e7f24d6afa4d4ba8227c80c4477688ae5a1759d
SHA5129f73d87d6aae38615afe3aedc7a3794159234938326c6b9127164b781740b18d98a4521227ae75eb225da16b2ab8f409b1f4886bf9e2e0d663b32be0b9dc7c0b