Overview
overview
7Static
static
3e2117b441b...03.exe
windows7-x64
7e2117b441b...03.exe
windows10-2004-x64
7$PLUGINSDI...nt.dll
windows7-x64
3$PLUGINSDI...nt.dll
windows10-2004-x64
3$PLUGINSDI...ge.dll
windows7-x64
3$PLUGINSDI...ge.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...te.dll
windows7-x64
1$PLUGINSDI...te.dll
windows10-2004-x64
1$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$TEMP/nsisos.dll
windows7-x64
1$TEMP/nsisos.dll
windows10-2004-x64
1IDBoan.exe
windows7-x64
6IDBoan.exe
windows10-2004-x64
7IDBoanMon.exe
windows7-x64
3IDBoanMon.exe
windows10-2004-x64
3IDBoanUpdate.exe
windows7-x64
6IDBoanUpdate.exe
windows10-2004-x64
7Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 16:06
Static task
static1
Behavioral task
behavioral1
Sample
e2117b441bb00e4bd08f23ec09ecfe03.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
e2117b441bb00e4bd08f23ec09ecfe03.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/DLLWebCount.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/DLLWebCount.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/ExLicenseIDBoanPage.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/ExLicenseIDBoanPage.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240319-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/SelfDelete.dll
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/SelfDelete.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
$TEMP/nsisos.dll
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
$TEMP/nsisos.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
IDBoan.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
IDBoan.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
IDBoanMon.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
IDBoanMon.exe
Resource
win10v2004-20240319-en
Behavioral task
behavioral19
Sample
IDBoanUpdate.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
IDBoanUpdate.exe
Resource
win10v2004-20240226-en
General
-
Target
IDBoanUpdate.exe
-
Size
1.8MB
-
MD5
5c26d3ae5bf2eafe78bb906d81047b48
-
SHA1
5badbfe50bca04ca88f4d1f336d1f925ef4da7f0
-
SHA256
7784f1f422aa413a4d556ad0b732b059564527c5d7ac2da5adbb2c9e89f39c5c
-
SHA512
ca7747cd4f4f125dff732bf36fcd2e89a02c01a500f117be650c46d3726cb6b032c5a4148f3618e4fc7b2746be3ee4e6d64b8bfc2edc280ebe4b918b10a6e25f
-
SSDEEP
49152:+t3dLZuK4AsiPdpnT2KkOd5GUEX4k0uBoxK+9:+t7z4As4t2KkOd5IX30yoo+9
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation IDBoanUpdate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IDBoan = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\IDBoan.exe\" /run1琀" IDBoan.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1416 2184 WerFault.exe 90 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{F072692A-EC53-11EE-BC63-5A176B010E55} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Internet Explorer\Main IDBoan.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2184 IDBoan.exe 2184 IDBoan.exe 2184 IDBoan.exe 2184 IDBoan.exe 2184 IDBoan.exe 2184 IDBoan.exe 2184 IDBoan.exe 2184 IDBoan.exe 2184 IDBoan.exe 2184 IDBoan.exe 2184 IDBoan.exe 2184 IDBoan.exe 2184 IDBoan.exe 2184 IDBoan.exe 2184 IDBoan.exe 2184 IDBoan.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 4500 IDBoanUpdate.exe 4500 IDBoanUpdate.exe 4500 IDBoanUpdate.exe 4500 IDBoanUpdate.exe 2184 IDBoan.exe 2184 IDBoan.exe 2184 IDBoan.exe 4792 IDBoanMon.exe 4920 iexplore.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 4500 IDBoanUpdate.exe 4500 IDBoanUpdate.exe 4500 IDBoanUpdate.exe 4500 IDBoanUpdate.exe 2184 IDBoan.exe 2184 IDBoan.exe 2184 IDBoan.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 4500 IDBoanUpdate.exe 4500 IDBoanUpdate.exe 2184 IDBoan.exe 2184 IDBoan.exe 4792 IDBoanMon.exe 4792 IDBoanMon.exe 2184 IDBoan.exe 4920 iexplore.exe 4920 iexplore.exe 3452 IEXPLORE.EXE 3452 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4500 wrote to memory of 2184 4500 IDBoanUpdate.exe 90 PID 4500 wrote to memory of 2184 4500 IDBoanUpdate.exe 90 PID 4500 wrote to memory of 2184 4500 IDBoanUpdate.exe 90 PID 2184 wrote to memory of 4792 2184 IDBoan.exe 93 PID 2184 wrote to memory of 4792 2184 IDBoan.exe 93 PID 2184 wrote to memory of 4792 2184 IDBoan.exe 93 PID 4920 wrote to memory of 3452 4920 iexplore.exe 98 PID 4920 wrote to memory of 3452 4920 iexplore.exe 98 PID 4920 wrote to memory of 3452 4920 iexplore.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\IDBoanUpdate.exe"C:\Users\Admin\AppData\Local\Temp\IDBoanUpdate.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\IDBoan.exe"C:\Users\Admin\AppData\Local\Temp\IDBoan.exe" /RUN02⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\IDBoanMon.exe"C:\Users\Admin\AppData\Local\Temp\IDBoanMon.exe"3⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 21403⤵
- Program crash
PID:1416
-
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:4512
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4920 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2184 -ip 21841⤵PID:4168