Resubmissions
16-03-2024 17:14
240316-vsg33ahc39 716-03-2024 17:12
240316-vqyb9shb94 1016-03-2024 15:47
240316-s8g2wsea5y 10Analysis
-
max time kernel
118s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16-03-2024 17:12
Static task
static1
Behavioral task
behavioral1
Sample
BUG32.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
Windows/Bonzify.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
BossDaMajor.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
FakeGoldenEye.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
PCToaster.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral6
Sample
Bolbi.vbs
Resource
win10v2004-20240226-en
General
-
Target
PCToaster.exe
-
Size
411KB
-
MD5
04251a49a240dbf60975ac262fc6aeb7
-
SHA1
e211ca63af2ab85ffab1e5fbbdf28a4ef8f77de0
-
SHA256
85a58aa96dccd94316a34608ba996656a22c8158d5156b6e454d9d69e6ff38c3
-
SHA512
3422a231e1dadb68d3567a99d46791392ecf5883fd3bbc2cae19a595364dac46e4b2712db70b61b488937d906413d39411554034ffd3058389700a93c17568d2
-
SSDEEP
3072:quJFS5Aqu+WwjxeI/0gVnfKl0FA+aPobO24yNz88iu8vDYHTlI5EJD5Hbibfd6PK:/JM0mCsWq1/qpz+nF5c
Malware Config
Signatures
-
Possible privilege escalation attempt 3 IoCs
pid Process 3748 icacls.exe 3576 takeown.exe 4900 takeown.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 3748 icacls.exe 3576 takeown.exe 4900 takeown.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: takeown.exe File opened (read-only) \??\V: takeown.exe -
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3576 takeown.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1844 javaw.exe 1844 javaw.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3620 wrote to memory of 1844 3620 PCToaster.exe 88 PID 3620 wrote to memory of 1844 3620 PCToaster.exe 88 PID 1844 wrote to memory of 3748 1844 javaw.exe 91 PID 1844 wrote to memory of 3748 1844 javaw.exe 91 PID 1844 wrote to memory of 2568 1844 javaw.exe 95 PID 1844 wrote to memory of 2568 1844 javaw.exe 95 PID 1844 wrote to memory of 3216 1844 javaw.exe 98 PID 1844 wrote to memory of 3216 1844 javaw.exe 98 PID 1844 wrote to memory of 3576 1844 javaw.exe 103 PID 1844 wrote to memory of 3576 1844 javaw.exe 103 PID 1844 wrote to memory of 4900 1844 javaw.exe 105 PID 1844 wrote to memory of 4900 1844 javaw.exe 105 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2568 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PCToaster.exe"C:\Users\Admin\AppData\Local\Temp\PCToaster.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\PCToaster.exe"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3748
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +h C:\Users\Admin\AppData\Local\Temp\scr.txt3⤵
- Views/modifies file attributes
PID:2568
-
-
C:\Windows\SYSTEM32\diskpart.exediskpart /s C:\Users\Admin\AppData\Local\Temp\scr.txt3⤵PID:3216
-
-
C:\Windows\SYSTEM32\takeown.exetakeown /f V:\Boot /r3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:3576
-
-
C:\Windows\SYSTEM32\takeown.exetakeown /f V:\Recovery /r3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Enumerates connected drives
PID:4900
-
-
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:2848
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:5016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD58bb723ac48b9445b6290586f39821a36
SHA112c9b9f21800ea747a44a542154eecf7a3f27ef0
SHA256fd03577ce424c54a78789921f00f82f5b6ed1731c55a7e9258c3dfef1c5e0875
SHA5120aa0a68c342f74d7899bbeecacd6f232d5dc5c497e12f670195755a6daec6fd4bd074831438a5a417339663ccdf1d2475fd3c715058738e8790b59097d7c11c2
-
Filesize
45B
MD5ad1869d6f0b2b809394605d3e73eeb74
SHA14bdedd14bfea9f891b98c4cc82c5f82a58df67f6
SHA2567e9cde40095f2a877375cb30fecd4f64cf328e3ab11baed5242f73cbb94bd394
SHA5128fe0f269daf94feaa246a644dbeeda52916855f1d2bfd2c6c876c7c9c80b0ceb7e42caf0b64a70bda9a64d4529b885aaa38998a515d6abbe88ad367e72324136