Overview
overview
7Static
static
7f6dea9e303...d2.exe
windows7-x64
7f6dea9e303...d2.exe
windows10-2004-x64
7$PLUGINSDIR/BI.exe
windows7-x64
7$PLUGINSDIR/BI.exe
windows10-2004-x64
7$PLUGINSDI...CC.exe
windows7-x64
7$PLUGINSDI...CC.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...lp.dll
windows7-x64
1$PLUGINSDI...lp.dll
windows10-2004-x64
1$PLUGINSDI...er.exe
windows7-x64
7$PLUGINSDI...er.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...PIE.js
windows7-x64
3$PLUGINSDI...PIE.js
windows10-2004-x64
3$PLUGINSDI...ed.htm
windows7-x64
1$PLUGINSDI...ed.htm
windows10-2004-x64
1$PLUGINSDI...API.js
windows7-x64
3$PLUGINSDI...API.js
windows10-2004-x64
3$PLUGINSDI...ams.js
windows7-x64
3$PLUGINSDI...ams.js
windows10-2004-x64
3$PLUGINSDI...PIE.js
windows7-x64
3$PLUGINSDI...PIE.js
windows10-2004-x64
3$PLUGINSDI...Bar.js
windows7-x64
3$PLUGINSDI...Bar.js
windows10-2004-x64
3$PLUGINSDI...ore.js
windows7-x64
3$PLUGINSDI...ore.js
windows10-2004-x64
3$PLUGINSDI...min.js
windows7-x64
3$PLUGINSDI...min.js
windows10-2004-x64
3$PLUGINSDI...on2.js
windows7-x64
3$PLUGINSDI...on2.js
windows10-2004-x64
3Analysis
-
max time kernel
95s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
05-07-2024 04:52
Behavioral task
behavioral1
Sample
f6dea9e303e32a64e1d30893cf904f1017c1742e436e41f118fd8c09cd6730d2.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f6dea9e303e32a64e1d30893cf904f1017c1742e436e41f118fd8c09cd6730d2.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/BI.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BI.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/DownloadACC.exe
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/DownloadACC.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/FirefoxHandler.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/FirefoxHandler.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/OCSetupHlp.dll
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/OCSetupHlp.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/ProxyInstaller.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/ProxyInstaller.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/WebApp/Css/PIE.js
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/WebApp/Css/PIE.js
Resource
win10v2004-20240704-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/WebApp/Failed.htm
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/WebApp/Failed.htm
Resource
win10v2004-20240704-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/WebApp/Js/API.js
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/WebApp/Js/API.js
Resource
win10v2004-20240704-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/WebApp/Js/ExternalParams.js
Resource
win7-20240419-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/WebApp/Js/ExternalParams.js
Resource
win10v2004-20240704-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/WebApp/Js/PIE.js
Resource
win7-20240220-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/WebApp/Js/PIE.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/WebApp/Js/ProgressBar.js
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/WebApp/Js/ProgressBar.js
Resource
win10v2004-20240704-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/WebApp/Js/Store.js
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/WebApp/Js/Store.js
Resource
win10v2004-20240704-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/WebApp/Js/jquery-ui-1.8.16.custom.min.js
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/WebApp/Js/jquery-ui-1.8.16.custom.min.js
Resource
win10v2004-20240704-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/WebApp/Js/json2.js
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/WebApp/Js/json2.js
Resource
win10v2004-20240508-en
General
-
Target
f6dea9e303e32a64e1d30893cf904f1017c1742e436e41f118fd8c09cd6730d2.exe
-
Size
1.2MB
-
MD5
37bfbdc59bf8d8228410866b1e8b7221
-
SHA1
33e543f255ed6bf70e9739f751baf1c1e4c34a00
-
SHA256
f6dea9e303e32a64e1d30893cf904f1017c1742e436e41f118fd8c09cd6730d2
-
SHA512
c23161ac77982e58dcc0f95947f06b12934d41183e3130e93d81fd101495bc157d14988ad0a4ccdb45a46866b3cebfa1117a6e01662d8fde15c54f11b4f1f28e
-
SSDEEP
24576:4jakjfsKRSQ35Lv0qfYlQXHmZAGNYAZrBW:4ujQpQRleHqXZrBW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2920 BI.exe -
Loads dropped DLL 6 IoCs
pid Process 1904 f6dea9e303e32a64e1d30893cf904f1017c1742e436e41f118fd8c09cd6730d2.exe 1904 f6dea9e303e32a64e1d30893cf904f1017c1742e436e41f118fd8c09cd6730d2.exe 2920 BI.exe 2920 BI.exe 2920 BI.exe 1904 f6dea9e303e32a64e1d30893cf904f1017c1742e436e41f118fd8c09cd6730d2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3824 1904 WerFault.exe 79 -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1904 f6dea9e303e32a64e1d30893cf904f1017c1742e436e41f118fd8c09cd6730d2.exe 1904 f6dea9e303e32a64e1d30893cf904f1017c1742e436e41f118fd8c09cd6730d2.exe 1904 f6dea9e303e32a64e1d30893cf904f1017c1742e436e41f118fd8c09cd6730d2.exe 1904 f6dea9e303e32a64e1d30893cf904f1017c1742e436e41f118fd8c09cd6730d2.exe 1904 f6dea9e303e32a64e1d30893cf904f1017c1742e436e41f118fd8c09cd6730d2.exe 1904 f6dea9e303e32a64e1d30893cf904f1017c1742e436e41f118fd8c09cd6730d2.exe 1904 f6dea9e303e32a64e1d30893cf904f1017c1742e436e41f118fd8c09cd6730d2.exe 1904 f6dea9e303e32a64e1d30893cf904f1017c1742e436e41f118fd8c09cd6730d2.exe 1904 f6dea9e303e32a64e1d30893cf904f1017c1742e436e41f118fd8c09cd6730d2.exe 1904 f6dea9e303e32a64e1d30893cf904f1017c1742e436e41f118fd8c09cd6730d2.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1904 wrote to memory of 2920 1904 f6dea9e303e32a64e1d30893cf904f1017c1742e436e41f118fd8c09cd6730d2.exe 83 PID 1904 wrote to memory of 2920 1904 f6dea9e303e32a64e1d30893cf904f1017c1742e436e41f118fd8c09cd6730d2.exe 83 PID 1904 wrote to memory of 2920 1904 f6dea9e303e32a64e1d30893cf904f1017c1742e436e41f118fd8c09cd6730d2.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6dea9e303e32a64e1d30893cf904f1017c1742e436e41f118fd8c09cd6730d2.exe"C:\Users\Admin\AppData\Local\Temp\f6dea9e303e32a64e1d30893cf904f1017c1742e436e41f118fd8c09cd6730d2.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\nso75DD.tmp\BI.exeC:\Users\Admin\AppData\Local\Temp\nso75DD.tmp\BI.exe { "json_send_time" : "5/7/2024 9:46:37:599" , "product_id_version" : "" , "product_type" : "" , "product_id" : "" , "offer_id" : "246613" , "user_type" : "NULL" , "result" : "Success" , "user_operating_system_bits" : "" , "current_default_search" : "" , "current_homepage" : "" , "current_toolbars" : "" , "attempt_number" : "1" , "is_silent" : "" , "user_ms_dotnet_framework_ver" : "" , "user_acount_type" : "" , "user_ie_version" : "" , "user_default_browser_version" : "" , "user_default_browser" : "" , "user_service_pack" : "" , "user_operating_system" : "" , "revision_number" : "0" , "build_id" : "00000000" , "dm_version" : "1.3.7.8_HF8" , "bundle_id" : "23ddfd90-e9b5-4f86-a094-28479bf79794" , "machine_user_id" : "{71667847-A4E0-4677-957A-1FECC215EEED}" , "send_attempt" : "0" , "channel_id" : "" , "installation_session_id" : "338D8862-84FC-44E4-828F-EB59FB67C4CD" , "publisher_internal_id" : "1" , "publisher_id" : "Brothersoft" , "publisher_account_id" : "Brothersoft" , "order" : "1.0" , "phase" : "Init" , "Is_Test" : "0" }2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1904 -s 23282⤵
- Program crash
PID:3824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1904 -ip 19041⤵PID:1964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD569f10f991b3eb6fda3fd4813be4fc87d
SHA12583ffa11b89f907b80b78614ba27f0a911d5aab
SHA2569855aaa371f7f27796b2bdd3d935a8dbd52dada91309af0d537ed8f5b7a583ae
SHA5121ee8e44a569a0dd8668bf6d54bd2efec8ea09424668409d8f216ad37cc40c60d2ebc411960ba63c60d81fd4bd719a507a7678241aa2f3b51c77a155f5f7d6c0d
-
Filesize
83KB
MD50c5a26a60bda315abe34b46d79a34cb5
SHA1fc1188b5f136fab9909eee42d4528ae3e6357916
SHA25670143201f13ce305ae958ada21aa6a03ba58035e1b6eead330c70f716f938663
SHA51215f3b932375244d2bf61128ebbb47439a9c25bc1d7b0dc52acfe7e128064e7de641a47535d4a90724f8fc321b122d526c4d36b9602782a41d0a15041a6dafd13
-
Filesize
17KB
MD5a4f38d1c7a480f5da1bb8097b8b939db
SHA1b3129c2a0e61881381463f5e0cbbffa573daa845
SHA256e1180e1e3344c7536150275e33de53dc1dd1a3ca03be66c4d4875fe5bcd4e436
SHA512fed89f7ee9364fc2f4b9f82c4563713497043947e98dbb03e7d755681adf3ae661aba80d08e59988a23695fc64481b69d9842b7ec7d2b572cc872c4c9957febc
-
Filesize
9KB
MD50c1797a7fe8c65cf36ca5bc35aad0ff7
SHA1b2754700c45211e641a59c1ddf55f47d55d43bdc
SHA25685ec98a0fc8ff6c202e0a01142814a5a5438a71636a4025a2a8506cc7b22edba
SHA51276e5eefc894f815099e8360d89253505b8f29974b71d63e0a5e0636e6db9f8793bf11e992140b89d478a856402741222ad0bf2acff72f95d13fb60b370b13231
-
Filesize
3KB
MD59b8cf1c97726c080629c98ddec68bebd
SHA15d764a5bc2e5cbb5f2569336e4c0c5f472d07f35
SHA2561b6c626d6a600be68b11133c7bcd32fbcc8015951037bb36beaa067914367715
SHA51267c590d216e73d0dd58974567dc248e0adb363c59e318efe1e715960a38220c1cfb98328cdb69941888f9e039d60980fd1fcf11084498fcb46f80c135cb60d24
-
Filesize
3KB
MD5383c888ce1b2a0430079ec4c0ba0089c
SHA1b2a68682fee9856e9d23f00f3ff60d87759a3bfd
SHA256a652514ccc5a33354e5c89d178d49a5e2d69f605dd34234bb28091d4f44d523b
SHA5123253ab2980c5f1b895cc73f91e568e1337095dc6eb616e7b1f131b084945f3e98e84f861d1848e777c77863a864101463c5865f260fec6d8e1bbf896a9682632
-
Filesize
29KB
MD5ee9f5f23a8757923484e02e4dee3aea4
SHA1f60058e0c942874ad3414319e39427ed25589d5d
SHA256eb10da974b6f87986897131c0703fb3305114864fcc220900aeabea0d0248241
SHA5127df5017042899771e3862e3e1be19b7782a421f37caaa0ffe8f52c3b76f446d0b61e8c18950204893c6332d51b2dc490da3fa94c7ca7979aac7bf247af2f1e35
-
Filesize
711KB
MD548a425482a174c711609aa3decfc1ac1
SHA10e5e75c2350b784c30fa9abc3981efabc3229160
SHA256650f59f7acd05554ab5c77c6274e33d0c31273b6c3c37ef45744c8994b542d4e
SHA512cecfb20ef24cd13fa014a4e4a96f7ceaf79d34df7f22404a82fdcc054eb09de4d17e883495fd6ff0cd4902fb5963050c3c512699f4bcd78cebaf7cdc825d0ba8