Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-02-2024 13:41

General

  • Target

    a1fdd1e367851bbd91cdde603d10d4b9.exe

  • Size

    552KB

  • MD5

    a1fdd1e367851bbd91cdde603d10d4b9

  • SHA1

    2b0f640b54ea44b7c59b31b7eb0c08e233ee4876

  • SHA256

    883d51c41271cd28a3b20969f14789c13bc5f7971f884013e84fc8d1f54f7304

  • SHA512

    8311f900beb589902ef014d385525a7728bce2154e6d24c9aa8f6ab8a988aa5aea64d10fa6d056f99995ba5f846ceb611df887056d15a27a6a266438433a6496

  • SSDEEP

    12288:2JupwI3iV2ENXh2mqBMDMe8BZqW9vg/ddK32s/QjkOSR2QaY:2PI3Q2yh27M0ZB0d+QjkjQm

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 33 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 18 IoCs
  • Drops file in Windows directory 13 IoCs
  • Modifies registry class 47 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1fdd1e367851bbd91cdde603d10d4b9.exe
    "C:\Users\Admin\AppData\Local\Temp\a1fdd1e367851bbd91cdde603d10d4b9.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4632
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\a1l8.dll"
      2⤵
        PID:864
      • C:\Windows\SysWOW64\regsvr32.exe
        C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\b4cb.dll"
        2⤵
          PID:396
        • C:\Windows\SysWOW64\regsvr32.exe
          C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\4f3r.dll"
          2⤵
            PID:3420
          • C:\Windows\SysWOW64\regsvr32.exe
            C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\8b4o.dll"
            2⤵
              PID:2392
            • C:\Windows\SysWOW64\regsvr32.exe
              C:\Windows\system32\regsvr32.exe /s "C:\Windows\system32\8b4o.dll"
              2⤵
              • Loads dropped DLL
              • Installs/modifies Browser Helper Object
              • Modifies registry class
              PID:4436
            • C:\Windows\SysWOW64\bffd.exe
              C:\Windows\system32\bffd.exe -i
              2⤵
              • Executes dropped EXE
              PID:4628
            • C:\Windows\SysWOW64\bffd.exe
              C:\Windows\system32\bffd.exe -s
              2⤵
              • Executes dropped EXE
              PID:1812
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\system32\rundll32 C:\Windows\system32\841e.dll, Always
              2⤵
              • Loads dropped DLL
              • Writes to the Master Boot Record (MBR)
              • Drops file in System32 directory
              PID:4460
          • C:\Windows\SysWOW64\bffd.exe
            C:\Windows\SysWOW64\bffd.exe
            1⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Loads dropped DLL
            • Writes to the Master Boot Record (MBR)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3304
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\system32\rundll32 C:\Windows\system32\841e.dll,Always
              2⤵
              • Loads dropped DLL
              PID:3440

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\b.dll

            Filesize

            244KB

            MD5

            52b5c9d6743e2273919f245329a8386a

            SHA1

            b5dbff920d6f4683f52c509d3d634c11e64045f2

            SHA256

            2d5cca3f09415a3461d63bac5062675122414fe9b3d78e387e57283fb930b170

            SHA512

            fab010cce3d3038da2359daf722540df0adce10aa11f0c1b584a63b542bcd3ef25ee0f1d076fce1718f59339565e451a14aa5a311f327d58980774f5822826ce

          • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\p.dll

            Filesize

            408KB

            MD5

            47e27cde1286526ef3aaf4f972c18567

            SHA1

            12ea74cd7afb48d90330735f08f9ee3db5fc369b

            SHA256

            71de1a96284a1230fc1b379017f8284fcb807f5088ce0e0d706fd296e48b87a1

            SHA512

            5061672e028b8a39d0f4a5923dadded3b578f31770c6e975f0e385189478a437523d987da44b4c6779f261a8524415231db3699a4858fe9594bcaebc5f9050b3

          • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\s.exe

            Filesize

            148KB

            MD5

            3cb29611293c9cd7c9d932e80fbc7edd

            SHA1

            7d79840f4e8f89e62a03653ee1db6300020f3382

            SHA256

            6eddf063ad03016fca61f74d195e6ea49e9dddf618332c8fef2dd5e67a256856

            SHA512

            b3b8fba18e8fee28ad22144ea55a6dc8e3cf0ed9bceeedaf944b0965547455a84114dcf39c29ae84ad6a47ff32debd06b43e34d78241b82a31be6e7dd1b2b3bb

          • C:\Windows\SysWOW64\841e.dll

            Filesize

            267KB

            MD5

            762c9489e82bf633850e996c2cc6ea58

            SHA1

            7bdc73a2543b636f5a391f5de28e0ff4faf31d9e

            SHA256

            759454ca3966154d91303eabd4adb00e0705f8e3dadb5102e65e3de7bb082bbd

            SHA512

            fcb4119a749be44e2e61a9f837255a098324f7fa217431ffa5e59a4edacf036d84ca217b2b2ff1a5c32d878d257165a71c1d068720fa940a306cc8e95282cc73