Analysis
-
max time kernel
149s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 19:38
Static task
static1
Behavioral task
behavioral1
Sample
Plugins/CmdBar.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Plugins/CmdBar.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
betab.exe
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
betab.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
#/1.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
#/1.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
#/2.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
#/2.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
ioncube_loader_lin_5.4.so
Resource
ubuntu2004-amd64-20240221-en
General
-
Target
betab.exe
-
Size
407KB
-
MD5
0837a200fd5a11fab728f51384eb8cce
-
SHA1
7133b6733d36d28aa19b9366689845b356f2b9fd
-
SHA256
2701eb12bc858772f0fbb29b7c18c4780afecba78e778f4363a78fc8b39feb48
-
SHA512
176903813e8b28327f671ee4429a3ab51899e446c63cc84d182cbb6ebe68a85b61e22a83696b9b01e5cb251e7fcaa58c296b237a965045832568eda9b727a86f
-
SSDEEP
12288:qAz8w1X6aftpy7rqvDTdV9Jjg0/9N+5Ct:9zlmroh3JgQAe
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\EnableFirewall = "0" explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile explorer.exe -
Sets file execution options in registry 2 TTPs 4 IoCs
Processes:
1.exeexplorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\oa73eoc7m1.exe\DisableExceptionChainValidation 1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "xhoq.exe" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\oa73eoc7m1.exe 1.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
explorer.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe -
Executes dropped EXE 2 IoCs
Processes:
2.exe1.exepid process 428 2.exe 4884 1.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
Explorer.EXEexplorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Search = "C:\\ProgramData\\SearchEngine.exe" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Google Updater 2.0 = "C:\\ProgramData\\Google Updater 2.0\\oa73eoc7m1.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Updater 2.0 = "\"C:\\ProgramData\\Google Updater 2.0\\oa73eoc7m1.exe\"" explorer.exe -
Processes:
1.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
Processes:
1.exeexplorer.exepid process 4884 1.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2404 428 WerFault.exe 2.exe 4916 5016 WerFault.exe explorer.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
explorer.exeExplorer.EXE1.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Explorer.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Explorer.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 1.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer explorer.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 4 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" explorer.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" explorer.exe -
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Microsoft\Internet Explorer\Main explorer.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
2.exeexplorer.exepid process 428 2.exe 428 2.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
1.exepid process 4884 1.exe 4884 1.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
Processes:
2.exeExplorer.EXE1.exeexplorer.exedescription pid process Token: SeDebugPrivilege 428 2.exe Token: SeShutdownPrivilege 3424 Explorer.EXE Token: SeCreatePagefilePrivilege 3424 Explorer.EXE Token: SeDebugPrivilege 4884 1.exe Token: SeRestorePrivilege 4884 1.exe Token: SeBackupPrivilege 4884 1.exe Token: SeLoadDriverPrivilege 4884 1.exe Token: SeCreatePagefilePrivilege 4884 1.exe Token: SeShutdownPrivilege 4884 1.exe Token: SeTakeOwnershipPrivilege 4884 1.exe Token: SeChangeNotifyPrivilege 4884 1.exe Token: SeCreateTokenPrivilege 4884 1.exe Token: SeMachineAccountPrivilege 4884 1.exe Token: SeSecurityPrivilege 4884 1.exe Token: SeAssignPrimaryTokenPrivilege 4884 1.exe Token: SeCreateGlobalPrivilege 4884 1.exe Token: 33 4884 1.exe Token: SeCreateGlobalPrivilege 3424 Explorer.EXE Token: SeDebugPrivilege 5016 explorer.exe Token: SeRestorePrivilege 5016 explorer.exe Token: SeBackupPrivilege 5016 explorer.exe Token: SeLoadDriverPrivilege 5016 explorer.exe Token: SeCreatePagefilePrivilege 5016 explorer.exe Token: SeShutdownPrivilege 5016 explorer.exe Token: SeTakeOwnershipPrivilege 5016 explorer.exe Token: SeChangeNotifyPrivilege 5016 explorer.exe Token: SeCreateTokenPrivilege 5016 explorer.exe Token: SeMachineAccountPrivilege 5016 explorer.exe Token: SeSecurityPrivilege 5016 explorer.exe Token: SeAssignPrimaryTokenPrivilege 5016 explorer.exe Token: SeCreateGlobalPrivilege 5016 explorer.exe Token: 33 5016 explorer.exe Token: SeShutdownPrivilege 3424 Explorer.EXE Token: SeCreatePagefilePrivilege 3424 Explorer.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
betab.exe2.exe1.exedescription pid process target process PID 2836 wrote to memory of 428 2836 betab.exe 2.exe PID 2836 wrote to memory of 428 2836 betab.exe 2.exe PID 2836 wrote to memory of 428 2836 betab.exe 2.exe PID 428 wrote to memory of 3424 428 2.exe Explorer.EXE PID 428 wrote to memory of 3424 428 2.exe Explorer.EXE PID 428 wrote to memory of 3424 428 2.exe Explorer.EXE PID 428 wrote to memory of 3424 428 2.exe Explorer.EXE PID 428 wrote to memory of 3424 428 2.exe Explorer.EXE PID 428 wrote to memory of 3424 428 2.exe Explorer.EXE PID 428 wrote to memory of 3424 428 2.exe Explorer.EXE PID 428 wrote to memory of 3424 428 2.exe Explorer.EXE PID 428 wrote to memory of 3424 428 2.exe Explorer.EXE PID 428 wrote to memory of 3424 428 2.exe Explorer.EXE PID 2836 wrote to memory of 4884 2836 betab.exe 1.exe PID 2836 wrote to memory of 4884 2836 betab.exe 1.exe PID 2836 wrote to memory of 4884 2836 betab.exe 1.exe PID 4884 wrote to memory of 5016 4884 1.exe explorer.exe PID 4884 wrote to memory of 5016 4884 1.exe explorer.exe PID 4884 wrote to memory of 5016 4884 1.exe explorer.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Adds Run key to start application
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\betab.exe"C:\Users\Admin\AppData\Local\Temp\betab.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Roaming\2.exe"C:\Users\Admin\AppData\Roaming\2.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 428 -s 7764⤵
- Program crash
PID:2404
-
-
-
C:\Users\Admin\AppData\Roaming\1.exe"C:\Users\Admin\AppData\Roaming\1.exe"3⤵
- Sets file execution options in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Modifies firewall policy service
- Sets file execution options in registry
- Checks BIOS information in registry
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Enumerates system info in registry
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 11165⤵
- Program crash
PID:4916
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 428 -ip 4281⤵PID:440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 5016 -ip 50161⤵PID:1196
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD59c94decb82adea9cf528ddb56ff5fef1
SHA1d0d3dfb1ea87ea5a72a8e759e35c4bdaed4cfabb
SHA2562a59aa5d2ed61d359908f7cf6c8b099104627869c778a61d92201f392e7aa85e
SHA5123ab32bb2abb5b92e49cc322d29f0bdbc8de79aace3782bd30079455ffcc6f07ecd7c8d10522c0fce07dade813219886fdab7f8ff9e91685a2af42e22302e393c
-
Filesize
186KB
MD55adfa47d7c60b040350f0030c73e4a8f
SHA1cd396b9c81718a20f34413f73082690051a708e3
SHA256e1014e6e143d5bd95b776777c730ec7c5ba67b82d9e60e78c28ff9eebb3ea2b8
SHA512ffd7f515cd3670bd66ed096e77b9845d5e3566ff12755a1ab870dceff3d9d5081e518c5da72f6821727de2ead7d5df18246786968c9abb514a0699992e4a084a