Overview
overview
7Static
static
3e2117b441b...03.exe
windows7-x64
7e2117b441b...03.exe
windows10-2004-x64
7$PLUGINSDI...nt.dll
windows7-x64
3$PLUGINSDI...nt.dll
windows10-2004-x64
3$PLUGINSDI...ge.dll
windows7-x64
3$PLUGINSDI...ge.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...te.dll
windows7-x64
1$PLUGINSDI...te.dll
windows10-2004-x64
1$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$TEMP/nsisos.dll
windows7-x64
1$TEMP/nsisos.dll
windows10-2004-x64
1IDBoan.exe
windows7-x64
6IDBoan.exe
windows10-2004-x64
7IDBoanMon.exe
windows7-x64
3IDBoanMon.exe
windows10-2004-x64
3IDBoanUpdate.exe
windows7-x64
6IDBoanUpdate.exe
windows10-2004-x64
7Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 16:06
Static task
static1
Behavioral task
behavioral1
Sample
e2117b441bb00e4bd08f23ec09ecfe03.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
e2117b441bb00e4bd08f23ec09ecfe03.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/DLLWebCount.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/DLLWebCount.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/ExLicenseIDBoanPage.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/ExLicenseIDBoanPage.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240319-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/SelfDelete.dll
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/SelfDelete.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
$TEMP/nsisos.dll
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
$TEMP/nsisos.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
IDBoan.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
IDBoan.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
IDBoanMon.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
IDBoanMon.exe
Resource
win10v2004-20240319-en
Behavioral task
behavioral19
Sample
IDBoanUpdate.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
IDBoanUpdate.exe
Resource
win10v2004-20240226-en
General
-
Target
IDBoan.exe
-
Size
4.6MB
-
MD5
5826ff472ed14d14df0a306a171ac452
-
SHA1
49fd18bb02f8dd5272fa7fa03ae02fba032370f7
-
SHA256
4d9be43a1afc60e525c23ca54b0bcc2f80d15094652b1b791336175b5108635c
-
SHA512
01443b02882d99ab2888609530bb4b30621d79bdb8a5a9d3d773cc8547af9f293a99b1837dfe39de2e36ecd95ebbd22fa20f95923c92126e23076e8dd155dd6d
-
SSDEEP
12288:d7+zjJUmM0uQ0ghsSk92pTwQ9snqMDs42D+pEmUnbDPNEjivqCTuic:d7+zjyVpQD42KpEmUn3Pujivqmlc
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation IDBoan.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation IDBoan.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IDBoan = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\IDBoan.exe\" /run1\ued00" IDBoan.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3528 1860 WerFault.exe 92 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{ECDE2BC9-EC53-11EE-87B8-6257B05D87B4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\Main IDBoan.exe Set value (int) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1860 IDBoan.exe 1860 IDBoan.exe 1860 IDBoan.exe 1860 IDBoan.exe 1860 IDBoan.exe 1860 IDBoan.exe 1860 IDBoan.exe 1860 IDBoan.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 5076 IDBoanUpdate.exe 5076 IDBoanUpdate.exe 5076 IDBoanUpdate.exe 5076 IDBoanUpdate.exe 1860 IDBoan.exe 1860 IDBoan.exe 1860 IDBoan.exe 1256 IDBoanMon.exe 1508 iexplore.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 5076 IDBoanUpdate.exe 5076 IDBoanUpdate.exe 5076 IDBoanUpdate.exe 5076 IDBoanUpdate.exe 1860 IDBoan.exe 1860 IDBoan.exe 1860 IDBoan.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1708 IDBoan.exe 5076 IDBoanUpdate.exe 5076 IDBoanUpdate.exe 1860 IDBoan.exe 1860 IDBoan.exe 1256 IDBoanMon.exe 1256 IDBoanMon.exe 1860 IDBoan.exe 1508 iexplore.exe 1508 iexplore.exe 4272 IEXPLORE.EXE 4272 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1708 wrote to memory of 5076 1708 IDBoan.exe 88 PID 1708 wrote to memory of 5076 1708 IDBoan.exe 88 PID 1708 wrote to memory of 5076 1708 IDBoan.exe 88 PID 5076 wrote to memory of 1860 5076 IDBoanUpdate.exe 92 PID 5076 wrote to memory of 1860 5076 IDBoanUpdate.exe 92 PID 5076 wrote to memory of 1860 5076 IDBoanUpdate.exe 92 PID 1860 wrote to memory of 1256 1860 IDBoan.exe 93 PID 1860 wrote to memory of 1256 1860 IDBoan.exe 93 PID 1860 wrote to memory of 1256 1860 IDBoan.exe 93 PID 1508 wrote to memory of 4272 1508 iexplore.exe 96 PID 1508 wrote to memory of 4272 1508 iexplore.exe 96 PID 1508 wrote to memory of 4272 1508 iexplore.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\IDBoan.exe"C:\Users\Admin\AppData\Local\Temp\IDBoan.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\IDBoanUpdate.exe"C:\Users\Admin\AppData\Local\Temp\IDBoanUpdate.exe" /run02⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\IDBoan.exe"C:\Users\Admin\AppData\Local\Temp\IDBoan.exe" /run03⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\IDBoanMon.exe"C:\Users\Admin\AppData\Local\Temp\IDBoanMon.exe"4⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 21364⤵
- Program crash
PID:3528
-
-
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:4636
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1508 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1860 -ip 18601⤵PID:2520