Overview
overview
3Static
static
1bbv-cctv-m...ui.vbs
windows7-x64
1bbv-cctv-m...ui.vbs
windows10-2004-x64
1bbv-cctv-m...x.html
windows7-x64
1bbv-cctv-m...x.html
windows10-2004-x64
1bbv-cctv-m...ipt.js
windows7-x64
3bbv-cctv-m...ipt.js
windows10-2004-x64
3bbv-cctv-m...ack.js
windows7-x64
3bbv-cctv-m...ack.js
windows10-2004-x64
3bbv-cctv-m...er.vbs
windows7-x64
1bbv-cctv-m...er.vbs
windows10-2004-x64
1bbv-cctv-m...ack.js
windows7-x64
3bbv-cctv-m...ack.js
windows10-2004-x64
3Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 11:19
Static task
static1
Behavioral task
behavioral1
Sample
bbv-cctv-main/client/cl_ui.vbs
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
bbv-cctv-main/client/cl_ui.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
bbv-cctv-main/web/index.html
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
bbv-cctv-main/web/index.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
bbv-cctv-main/web/js/script.js
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
bbv-cctv-main/web/js/script.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
bbv-cctv-main/wrapper/cl_wp_callback.js
Resource
win7-20240419-en
Behavioral task
behavioral8
Sample
bbv-cctv-main/wrapper/cl_wp_callback.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
bbv-cctv-main/wrapper/cl_wrapper.vbs
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
bbv-cctv-main/wrapper/cl_wrapper.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
bbv-cctv-main/wrapper/sv_wp_callback.js
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
bbv-cctv-main/wrapper/sv_wp_callback.js
Resource
win10v2004-20240426-en
General
-
Target
bbv-cctv-main/web/index.html
-
Size
2KB
-
MD5
8e0c1261d4916c0bc69e2f38dbfbcdaf
-
SHA1
b02436abfe7f60ade08faee24729243611c2e8e0
-
SHA256
fb202c249965ff48c265599b2967c0a5f732ebf7107b40bbbf80b8f2de8b3682
-
SHA512
11fc2b743825ba56684ae302a067c7724946ebdaccdec4b6f2b91a54590b1f7b5d851fbcfe672aa0b270da851d1b6b8e93b3ab5d527c256522c5c11aa39570ef
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1876 msedge.exe 1876 msedge.exe 3260 msedge.exe 3260 msedge.exe 4568 identity_helper.exe 4568 identity_helper.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3260 wrote to memory of 1284 3260 msedge.exe 85 PID 3260 wrote to memory of 1284 3260 msedge.exe 85 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 2296 3260 msedge.exe 86 PID 3260 wrote to memory of 1876 3260 msedge.exe 87 PID 3260 wrote to memory of 1876 3260 msedge.exe 87 PID 3260 wrote to memory of 1728 3260 msedge.exe 88 PID 3260 wrote to memory of 1728 3260 msedge.exe 88 PID 3260 wrote to memory of 1728 3260 msedge.exe 88 PID 3260 wrote to memory of 1728 3260 msedge.exe 88 PID 3260 wrote to memory of 1728 3260 msedge.exe 88 PID 3260 wrote to memory of 1728 3260 msedge.exe 88 PID 3260 wrote to memory of 1728 3260 msedge.exe 88 PID 3260 wrote to memory of 1728 3260 msedge.exe 88 PID 3260 wrote to memory of 1728 3260 msedge.exe 88 PID 3260 wrote to memory of 1728 3260 msedge.exe 88 PID 3260 wrote to memory of 1728 3260 msedge.exe 88 PID 3260 wrote to memory of 1728 3260 msedge.exe 88 PID 3260 wrote to memory of 1728 3260 msedge.exe 88 PID 3260 wrote to memory of 1728 3260 msedge.exe 88 PID 3260 wrote to memory of 1728 3260 msedge.exe 88 PID 3260 wrote to memory of 1728 3260 msedge.exe 88 PID 3260 wrote to memory of 1728 3260 msedge.exe 88 PID 3260 wrote to memory of 1728 3260 msedge.exe 88 PID 3260 wrote to memory of 1728 3260 msedge.exe 88 PID 3260 wrote to memory of 1728 3260 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bbv-cctv-main\web\index.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff76e346f8,0x7fff76e34708,0x7fff76e347182⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,15696503697143091846,16976511321671341496,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,15696503697143091846,16976511321671341496,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,15696503697143091846,16976511321671341496,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,15696503697143091846,16976511321671341496,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,15696503697143091846,16976511321671341496,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,15696503697143091846,16976511321671341496,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,15696503697143091846,16976511321671341496,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,15696503697143091846,16976511321671341496,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,15696503697143091846,16976511321671341496,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,15696503697143091846,16976511321671341496,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,15696503697143091846,16976511321671341496,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,15696503697143091846,16976511321671341496,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1832 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4272
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3532
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
633B
MD59174948d36f5fad438f7246e888cc5b4
SHA19ed1a6a067980c6b8493466cdb46d06898fb97b4
SHA2569c365a2c4c6bc5a47ef72f6cac47c5c198640d3d11213b31699a7a55047f052a
SHA5128ae93771bca542f84c4fe071acd61cab6a53080407dfa3d3ed4e73ea51105f197449583148a4272cb707cfb9f3fdda8e39b948521b61f0f9dff1370d8713074b
-
Filesize
5KB
MD5a7bd02f35e81ed6fba9d752203e7d38b
SHA1261bc5dca0c3f7f6c2bc5a0c221931e997d9b5a2
SHA256b77eb8726aac02940474408e86ec6966f4e2339abf382e6e0e48c9c17fe426bd
SHA512fd12c1589e9b425cf63998ae4de82b786426aba74df5854309737d01acefd9272263f294235404b43e63d6f27a682ee6b22ba4c50162c797ccbaa5f3284543c9
-
Filesize
6KB
MD59df13c1373ac7c817d038f82d38af2dd
SHA142c7ffb220ff0d69d2d38bea12a4daad589d4ca0
SHA256296d16c3da16ad439edb4a7be47fbb5ca70225349d29f34c00d88f28b0789e25
SHA51249e4fc82c0e6e3e995de07f60dee19be65e19d958427a630d417eeaa7c49e1d1615e71e2e79437349667624abbd7f5a113136b79625857b72f1bc3cc24c3c5e0
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD55019884554ffa076c653d10ce1c8d38c
SHA1f72b1d08eae3a9c7d8c4dbdbe331f3a8745285c2
SHA25661742ce0f214643b645abc7fc99a8d20c4ead14cba1d928b5908bf8939475d57
SHA512fe211d0848b734887c22836c89593753d173459276d5f3ce06736093a5aa0d1a4574f50a80fe43cd4cfe66b848ed55b119c93f82a1a0387f94fc75582d27a336