Analysis

  • max time kernel
    151s
  • max time network
    160s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27-02-2024 22:03

General

  • Target

    OpenBullet-1.4.5.exe

  • Size

    4.4MB

  • MD5

    7c2a3d78f47b762d4df3215eb8d254da

  • SHA1

    0672d282519d991728daf47c632541ad691abe89

  • SHA256

    b96f1165af49ab8b321b3abc98da4a641c0ca071bdd5c612604e473236a45429

  • SHA512

    afd7f198dd227310c83d69f58c2a1b9a33a9dd7504c8772caea14baad807d1389cdf26ac0b3e953b2da58519bed5891b1a35d2889003d1a8f4a62fbe436cc02f

  • SSDEEP

    98304:BWft9wfW91g5Ej1I1FirUGvE5jaxMaUxnEkOkPQ4jq/fUrhnl:BWfweAOj1sir9E9sMQ4j2Mrhl

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs
  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\OpenBullet-1.4.5.exe
    "C:\Users\Admin\AppData\Local\Temp\OpenBullet-1.4.5.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2456
    • C:\Windows\System32\attrib.exe
      "C:\Windows\System32\attrib.exe" +h +s OpenBullet.exe
      2⤵
      • Views/modifies file attributes
      PID:2516
    • C:\Windows\System32\attrib.exe
      "C:\Windows\System32\attrib.exe" +h +s configs.dll
      2⤵
      • Views/modifies file attributes
      PID:2576
    • C:\Windows\System32\attrib.exe
      "C:\Windows\System32\attrib.exe" +h +s temp.ps1
      2⤵
      • Views/modifies file attributes
      PID:2684
    • C:\Windows\System32\rundll32.exe
      "C:\Windows\System32\rundll32.exe" configs.dll,tmp
      2⤵
      • Loads dropped DLL
      PID:2688
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep unrestricted -File ./temp.ps1
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2380
    • C:\Users\Admin\AppData\Local\Temp\OpenBullet.exe
      "C:\Users\Admin\AppData\Local\Temp\OpenBullet.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2700
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://forum.openbullet.dev/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:844
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:844 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fccee4bb3f9418f2cd91950ade6f6ec2

    SHA1

    c6889ee7c3be7b3c3ae2bf726c904cb0b40aaee6

    SHA256

    74d69ac1df77b1e2ce26a1de18915cb116623d073f04d91ae9c314cec5082850

    SHA512

    60d3548d3eb7f3461048a5c3eda8435006d9474777fadfcd165ee1a5248808e30a51cf5230c58fb68f562449727cebbd64883862d4e690ddba7ae8b3182ad369

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2dfb0286678f91757bdfc0ec5b356013

    SHA1

    8a795d5f9e1aa091a01940a458f90c16f4f724a8

    SHA256

    a09fdac2d4240cf3cf76a21a2919531c183a1cda155b05d5bb18e18fdaf58796

    SHA512

    23043fad0f0a2dfe87ad9b7f110058b2e33871b5f9712bac9a6b8e1d0597710120f612ba419b7ca470d2516dd53448efed529d888cc8a8d27890876123a4cb70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    aeec2327b38c01b7dbf3472e046d654c

    SHA1

    defc03efd175f1345c5a3d0a36f4e24b60822589

    SHA256

    22933cc515f25aef1ec1c00cbc5fdf38ecee86716be2e78e0be5de6e29879d9b

    SHA512

    2a1d0d673d8a2946ca06b0d0ee6de33e0e6c4860306bd83ffdef9055a301a0e0ba01d4d90a12622a9aeb406ca2a7a72434409e4bd3888ea9bb64b7622e6bc16e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    79484132303860db93c535b950960364

    SHA1

    30c190875efd2096e5169c19168afb44dc455ba7

    SHA256

    aaa42b2a09ae524e17410c1ccc9d95253bc573bef2f6549963e9edc53e66c6eb

    SHA512

    824c30b9d2289b208405305a5cfbc2e228e7e6b12f1f5e8d6f1c0289b76cdcbb01104d08c6e9136887ca57325f439ad13246495cf7d06ca154ab2e9eeb47a832

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fdd33ac439492a40a93e15d86057eb27

    SHA1

    4054bb9bf2356340b77bb612f367b6db345e92ea

    SHA256

    643bfb4b9f36313ca9f70a629365cbfd52c87855fcf0e3154859c7baafab3d8c

    SHA512

    d15b46da4cc40cc1098d99799fd9a03719e438e49075ced236b3619c687309ba9359bfd1aa74150b5e7de3354993d3c5ab00efb55599041bbc68c96dafc40f01

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    68f0bbe098b5de453f9fb9906f4e732b

    SHA1

    39d95a20d4c89821dfc6e873be9df023b59690d6

    SHA256

    9948b0549adacf1c003b8db01b3463d9f1656e4f3cbcb7f8e4131ab3c08c1d97

    SHA512

    d9270023aebf20979b9ffc213b9c0d0c6c761e0b4df2eac96de27eac8a21796a1b2a520aefab5aa09cab98494b5b0bf81cecc834b191f8b3c6071db005577028

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a061e1af9f71dfc462538b8c3bd1b0ec

    SHA1

    d8bcc5f896def78ef249692c0c1405e5d01fded8

    SHA256

    0a13a7b8c532f33c8ee9e754509ce97222d7b58dd77ed7ff381d540fe40ab436

    SHA512

    517e5ce5fdd6255bb36da890458830b7d95d9076588646ba626379bbbda034eed390f6fa927f6d073743f38c786b0d3e26d4d80a709ecad9882514abcf06d08f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0bea7f3395acb308c79ffb4d11097ce3

    SHA1

    6994f635aaeab565fe7f34ff4daf62aebe8fdf5f

    SHA256

    bb8e73cebf27ba1b5ebc927996b3ec67d71a5e6c378f25352f5184caaa3140cf

    SHA512

    10faed6f1728cd26d638bf511514e973972df3d61119344de95143c83293926379cb6bffdc0b02f4721aa2f5c5796089f67a07afdf6fee287e60bee0cdcdcf11

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3f3a2a5dd58f423afe478255ed166fd1

    SHA1

    bf6e96d2ba515b0ece384fc3fa4bf04ef3c8eabd

    SHA256

    6c6680588df1e42fcdf3dae16b2e44f3d148f327753b91efa65aa528564d2650

    SHA512

    d046fb2a60bd91999f5969ede49cd5e70f8018728994e7bca660da479b8672fc7105e8421e8aa1ee06313fe7d6d7b960f2df991c5e996fc3ae64bdb45b441516

  • C:\Users\Admin\AppData\Local\Temp\CabF1DE.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\OpenBullet.exe

    Filesize

    768KB

    MD5

    7a0620e0518a7a1a83ca1366bdc3a462

    SHA1

    800731d7c41c3085a77f5969e889820d402b852e

    SHA256

    d15330f87b8bca0ce74826ca4b56bd937ac3af66fa30f7dabfdcbeefc78aecea

    SHA512

    997c613b77e634b6fecb896bef00109056387e8598e90092034dce15db022fa93be20bfc89e65c92e54c988b0ec17e5aca5914c1427a0228b7c82ac4661ed04a

  • C:\Users\Admin\AppData\Local\Temp\OpenBullet.exe

    Filesize

    642KB

    MD5

    19a56e84e8e1e4bdb39f186455af5644

    SHA1

    0e475b74139d92ce1e71f4844945f27aed846c48

    SHA256

    71b070be63e53ef64e7aedbb2be291b872f7379f16d5f73280e4046deb6f8c5d

    SHA512

    f7e77454175de24b15b3ed9f5086c5e4b985ebc22796ff8e4b2414e37d12c427bb59ca7d9b186a5197054c6f191278904a83cb1b7ed3b0762819b23865651da0

  • C:\Users\Admin\AppData\Local\Temp\Tar1788.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\Tar1932.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

  • C:\Users\Admin\AppData\Local\Temp\configs.dll

    Filesize

    1.3MB

    MD5

    59b508a311c79d22811f81907f4bb094

    SHA1

    3ab5b3f839bf26046ca468155e65408b0ea60653

    SHA256

    98e12f2a8a787341125f32f80f1f4606034f28e601f6c3d1d5237fc8a83621db

    SHA512

    fb6dab69788b3021c8a0e619a7292c4dc1d5e0e43aa2d7b8cb1031071414bd6dfc777c24cda7b50776b3168bc4b44f3ef299f584f4059329a9718c19afe0bd48

  • C:\Users\Admin\AppData\Local\Temp\temp.ps1

    Filesize

    39KB

    MD5

    9f18ddd9edc4229b7861c5e87f87e177

    SHA1

    8d1ef0531c832c38bd5fdb6e0971d11fae1f9d3d

    SHA256

    b5dc729ad8048a1a1bc0c5f6f9621bdf9948af50b589bf2a5cc91e6d6ac17244

    SHA512

    3d7bde24e1006dc834af538c9494c7d6571e2ab02ccf5ae24a7ce9d54572af948e66037b3facc9f8fcad00cf22be6c54b22d2f617872f839cb949ce8515483ef

  • \Users\Admin\AppData\Local\Temp\configs.dll

    Filesize

    603KB

    MD5

    3c32e84d771c6e4b0939cd5bddcf711c

    SHA1

    ff11c3eeb798fa3fa4e838beca6b4c7fde383e7e

    SHA256

    347323939e70509fa91b1c4d994e1db576c3d06ad00aa78724626afb8bed77cd

    SHA512

    a759285cf5965b31640b861824bf8a896edc7ddcff06a1c017ad4dbf98eefd5ee825ced248bb220a0566d008a9960883c7acadafa2083aee10e3bffccb8fa9f0

  • \Users\Admin\AppData\Local\Temp\configs.dll

    Filesize

    544KB

    MD5

    182f24b63eb97348d4902fc607e96d5c

    SHA1

    42c3c64ee8d45bcce1efc18adf5477d102eea1db

    SHA256

    aca64f7ea05c4bda57a6a45dc51e3bf7b6ea30b066ad8ab3f0fe466ee06e3927

    SHA512

    c0fb241ef1cb15d92d15b0a00eeee357d6ede6823b46a5b6ce0e03701ede43f1fb0a4b22b788b4349a4344c67f7f8f586634c6fba838ad04b5ef57a9c67da969

  • \Users\Admin\AppData\Local\Temp\configs.dll

    Filesize

    843KB

    MD5

    e3fe505ee9d9b9c5417095dc8251f7fb

    SHA1

    cda46b777f275c179309b81ad6f807485329602f

    SHA256

    313708e4905f0341b632cf6e3b9b7e98eadbc54c7f62a9ebf43b20c94d0111d4

    SHA512

    822aebf6d01e633818131da0cafb33ea0dd90c7932dd5e7e7370bcfe5dc5c451c5f2b590cb27ea59dee30d281a332498f7274d247492ec714b4224f9ad4e4e48

  • \Users\Admin\AppData\Local\Temp\configs.dll

    Filesize

    647KB

    MD5

    c052ffab4e7070820ead3e7512ff3626

    SHA1

    65760d39f539f0460e9575b0aebbd70e5ebdc72e

    SHA256

    4fea1034d66d38f5b3ef68fcb175df4286c78a2d9703b525a8cde79bce6bcd99

    SHA512

    9bff7c606207b600dc6e760c2fdd7a141c2eb8891e67624eb40fdb029ec1cf717c8bdd6775358e041bcfe3a213e964130721e6e44d37005c83712dad21ec9a5a

  • memory/2380-27-0x0000000002964000-0x0000000002967000-memory.dmp

    Filesize

    12KB

  • memory/2380-25-0x000007FEF6070000-0x000007FEF6A0D000-memory.dmp

    Filesize

    9.6MB

  • memory/2380-26-0x000000000296B000-0x00000000029D2000-memory.dmp

    Filesize

    412KB

  • memory/2380-24-0x0000000002960000-0x00000000029E0000-memory.dmp

    Filesize

    512KB

  • memory/2380-21-0x0000000001FA0000-0x0000000001FA8000-memory.dmp

    Filesize

    32KB

  • memory/2380-19-0x000000001B330000-0x000000001B612000-memory.dmp

    Filesize

    2.9MB

  • memory/2688-22-0x000007FEF4FF0000-0x000007FEF5CFD000-memory.dmp

    Filesize

    13.1MB

  • memory/2688-20-0x000007FEF5D00000-0x000007FEF6A0D000-memory.dmp

    Filesize

    13.1MB

  • memory/2700-34-0x0000000000D40000-0x0000000000D9E000-memory.dmp

    Filesize

    376KB

  • memory/2700-35-0x00000000023F0000-0x0000000002414000-memory.dmp

    Filesize

    144KB

  • memory/2700-42-0x00000000009D0000-0x00000000009DA000-memory.dmp

    Filesize

    40KB

  • memory/2700-37-0x00000000009D0000-0x00000000009DA000-memory.dmp

    Filesize

    40KB

  • memory/2700-33-0x0000000000C50000-0x0000000000C98000-memory.dmp

    Filesize

    288KB

  • memory/2700-36-0x0000000004F10000-0x0000000004FBA000-memory.dmp

    Filesize

    680KB

  • memory/2700-41-0x0000000074B20000-0x000000007520E000-memory.dmp

    Filesize

    6.9MB

  • memory/2700-39-0x0000000005730000-0x00000000057A8000-memory.dmp

    Filesize

    480KB

  • memory/2700-38-0x00000000009D0000-0x00000000009DA000-memory.dmp

    Filesize

    40KB

  • memory/2700-32-0x0000000000A70000-0x0000000000A8C000-memory.dmp

    Filesize

    112KB

  • memory/2700-31-0x00000000009B0000-0x00000000009D0000-memory.dmp

    Filesize

    128KB

  • memory/2700-30-0x0000000000CB0000-0x0000000000CF0000-memory.dmp

    Filesize

    256KB

  • memory/2700-29-0x0000000000CB0000-0x0000000000CF0000-memory.dmp

    Filesize

    256KB

  • memory/2700-28-0x0000000074B20000-0x000000007520E000-memory.dmp

    Filesize

    6.9MB

  • memory/2700-23-0x0000000000DC0000-0x0000000000FE6000-memory.dmp

    Filesize

    2.1MB

  • memory/2700-40-0x0000000000CB0000-0x0000000000CF0000-memory.dmp

    Filesize

    256KB