Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 07:27
Static task
static1
Behavioral task
behavioral1
Sample
BHOP.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
BHOP.exe
Resource
win10v2004-20240508-en
General
-
Target
BHOP.exe
-
Size
1019KB
-
MD5
bb933ddc224c3ebf51b131408e3a6d1e
-
SHA1
485dd934553808f8162e58fbff2aa0b252727995
-
SHA256
3d35f9281e2e3a5d6aaae0c9eac26c2bd2ce6602606f3da6191c186b44bfbbf4
-
SHA512
443fa883f496d788e14b52e9b301a2c800b5671959947f9ae4a053244b2d5e5cac736eeecf65d0b7c6c26dafc9db81720ae3dd415009993d850a2b47e4ef39e5
-
SSDEEP
24576:78DhT4UFRr8J6O7/CCszHM4FwiU/cmVUCcnUYFVL:o1kUFR43j4BWc3zVL
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3988 icacls.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3040 PING.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2444 javaw.exe 2444 javaw.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 868 wrote to memory of 2444 868 BHOP.exe 80 PID 868 wrote to memory of 2444 868 BHOP.exe 80 PID 2444 wrote to memory of 3988 2444 javaw.exe 81 PID 2444 wrote to memory of 3988 2444 javaw.exe 81 PID 2444 wrote to memory of 4484 2444 javaw.exe 84 PID 2444 wrote to memory of 4484 2444 javaw.exe 84 PID 4484 wrote to memory of 3040 4484 cmd.exe 86 PID 4484 wrote to memory of 3040 4484 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\BHOP.exe"C:\Users\Admin\AppData\Local\Temp\BHOP.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -Dlaunch4j.exedir="C:\Users\Admin\AppData\Local\Temp" -Dlaunch4j.exefile="C:\Users\Admin\AppData\Local\Temp\BHOP.exe" -Dhttps.protocols="SSLv3,TLSv1,TLSv1.1,TLSv1.2" -jar "C:\Users\Admin\AppData\Local\Temp\BHOP.exe"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
PID:3988
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe "/c ""%systemroot%\system32\ping.exe" -n 2 localhost > nul && move /y "C:\Users\Admin\AppData\Local\Temp\BHOP\BHOP.new" "C:\Users\Admin\AppData\Local\Temp\BHOP.exe" && move /y "C:\Users\Admin\AppData\Local\Temp\BHOP.exe" "C:\Users\Admin\AppData\Local\Temp\BHOP.exe"""3⤵
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\ping.exe" -n 2 localhost4⤵
- Runs ping.exe
PID:3040
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5c673d7f9d18adbba3b16b1433e261b0e
SHA15121dbd76c6fd151d21261933dd6d19f1f9dc07f
SHA2561aade03cbe633f04e7b618bacd204ff0b7bae6c8ab77846e5e24dcef0fe439c9
SHA512db9facbbf96a85302a88c9e5bfcd037b189f4743f6b0e7f961f971e4896b1e5e87863de8de66b6aabaad5c309b71ead88bc5954b68944b4df50dd36535618ac6
-
Filesize
1018KB
MD548df92ffbc86bd3c605a0020e012677c
SHA15aa630b4e9a5d793f7e598bfb218d79b356667b6
SHA2563e844976f4a5f47fdf56dfe348651bbbe8628acbbb5ba3507f23b446304be1ce
SHA512489444ac7c68865d54a0f1ca7d1e3a96c8db9021c8843a2d2c4acb818f3f2d4daeb1e74c5a6a62439fbd7acd01bedabf9d3d5350f40020961887c034067bb740