Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/03/2024, 14:13
Static task
static1
Behavioral task
behavioral1
Sample
df5c4e4e78597f50f22194b647f0271a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
df5c4e4e78597f50f22194b647f0271a.exe
Resource
win10v2004-20240226-en
General
-
Target
df5c4e4e78597f50f22194b647f0271a.exe
-
Size
80KB
-
MD5
df5c4e4e78597f50f22194b647f0271a
-
SHA1
a2a7e00229cba5947094c2cb9e3775f5a02ecdbb
-
SHA256
44c63dcc93c7c22b2a7afc8a857317aa8139ed7eff29d72db5387b40d869e671
-
SHA512
941864a9e0e002ab9263281a83dd660830d4ac0ca4d8533e452892901ee9232b725a2a2537017cc40f368d282378a12f7e0ea28132242163084aef4ba1214a2a
-
SSDEEP
1536:wQmto47yF8e/O+TtSv6DhjFEA5n6qtvmzrRptAi858J8MGu1N3i6Enw:j4FMw
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" df5c4e4e78597f50f22194b647f0271a.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" boaoso.exe -
Executes dropped EXE 1 IoCs
pid Process 1424 boaoso.exe -
Loads dropped DLL 2 IoCs
pid Process 1056 df5c4e4e78597f50f22194b647f0271a.exe 1056 df5c4e4e78597f50f22194b647f0271a.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\boaoso = "C:\\Users\\Admin\\boaoso.exe /b" boaoso.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\boaoso = "C:\\Users\\Admin\\boaoso.exe /y" boaoso.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\boaoso = "C:\\Users\\Admin\\boaoso.exe /j" boaoso.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\boaoso = "C:\\Users\\Admin\\boaoso.exe /h" boaoso.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\boaoso = "C:\\Users\\Admin\\boaoso.exe /z" boaoso.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\boaoso = "C:\\Users\\Admin\\boaoso.exe /v" boaoso.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\boaoso = "C:\\Users\\Admin\\boaoso.exe /s" boaoso.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\boaoso = "C:\\Users\\Admin\\boaoso.exe /d" boaoso.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\boaoso = "C:\\Users\\Admin\\boaoso.exe /i" boaoso.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\boaoso = "C:\\Users\\Admin\\boaoso.exe /p" boaoso.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\boaoso = "C:\\Users\\Admin\\boaoso.exe /g" boaoso.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\boaoso = "C:\\Users\\Admin\\boaoso.exe /t" boaoso.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\boaoso = "C:\\Users\\Admin\\boaoso.exe /x" df5c4e4e78597f50f22194b647f0271a.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\boaoso = "C:\\Users\\Admin\\boaoso.exe /c" boaoso.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\boaoso = "C:\\Users\\Admin\\boaoso.exe /n" boaoso.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\boaoso = "C:\\Users\\Admin\\boaoso.exe /r" boaoso.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\boaoso = "C:\\Users\\Admin\\boaoso.exe /u" boaoso.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\boaoso = "C:\\Users\\Admin\\boaoso.exe /k" boaoso.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\boaoso = "C:\\Users\\Admin\\boaoso.exe /e" boaoso.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\boaoso = "C:\\Users\\Admin\\boaoso.exe /q" boaoso.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\boaoso = "C:\\Users\\Admin\\boaoso.exe /x" boaoso.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\boaoso = "C:\\Users\\Admin\\boaoso.exe /l" boaoso.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\boaoso = "C:\\Users\\Admin\\boaoso.exe /m" boaoso.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\boaoso = "C:\\Users\\Admin\\boaoso.exe /w" boaoso.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\boaoso = "C:\\Users\\Admin\\boaoso.exe /o" boaoso.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\boaoso = "C:\\Users\\Admin\\boaoso.exe /f" boaoso.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\boaoso = "C:\\Users\\Admin\\boaoso.exe /a" boaoso.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1056 df5c4e4e78597f50f22194b647f0271a.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe 1424 boaoso.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1056 df5c4e4e78597f50f22194b647f0271a.exe 1424 boaoso.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1056 wrote to memory of 1424 1056 df5c4e4e78597f50f22194b647f0271a.exe 28 PID 1056 wrote to memory of 1424 1056 df5c4e4e78597f50f22194b647f0271a.exe 28 PID 1056 wrote to memory of 1424 1056 df5c4e4e78597f50f22194b647f0271a.exe 28 PID 1056 wrote to memory of 1424 1056 df5c4e4e78597f50f22194b647f0271a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\df5c4e4e78597f50f22194b647f0271a.exe"C:\Users\Admin\AppData\Local\Temp\df5c4e4e78597f50f22194b647f0271a.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\boaoso.exe"C:\Users\Admin\boaoso.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5129fee1b12c3e1a356872d815e306094
SHA1438c1b98fddb7eba62ccae4fe1dcdd6d116bdfdd
SHA256d4d271fd3bdff592e18fddff13e26e3a5db343dd06e5aafdaa1b7957c9fb0290
SHA51285c5742c260f7e7c4325106bcdae4036be7f2a64232731e20d876584b3523e00370970da3613f08369bce1fcd4b03dbdd3502e560ed68dc87bb0573899349617