Overview
overview
7Static
static
3dbfman131.exe
windows7-x64
7dbfman131.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3DBFManager.exe
windows7-x64
6DBFManager.exe
windows10-2004-x64
3Homepage.url
windows7-x64
6Homepage.url
windows10-2004-x64
3Uninst.exe
windows7-x64
7Uninst.exe
windows10-2004-x64
7dbfmanager.chm
windows7-x64
1dbfmanager.chm
windows10-2004-x64
1Analysis
-
max time kernel
141s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 03:12
Static task
static1
Behavioral task
behavioral1
Sample
dbfman131.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dbfman131.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
DBFManager.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
DBFManager.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
Homepage.url
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
Homepage.url
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
Uninst.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
Uninst.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
dbfmanager.chm
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
dbfmanager.chm
Resource
win10v2004-20240704-en
General
-
Target
DBFManager.exe
-
Size
1.4MB
-
MD5
1c049946735089036f664e195c384bdc
-
SHA1
51be44344e0649281585b8f7182a2bda5cedcba4
-
SHA256
f58001de63539de3ccee1f17ae5960c2c3eb382f590ef264cca7885271a96aef
-
SHA512
1c0f27408268ed5750fa93d7a80c48af64acd4139f78880ebde839fe38ab47578475070d3956921abdc9ed4deda2af8c3ce7e8ca7575689e017791465bc324f5
-
SSDEEP
24576:n3TlQecqWNtXw9vBw517N8MocQqpKp68HRXYA6TmnQEPY1478eADQloZytIfN8:nfcVNt4W5H1f46oRIibQm787DQztI18
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 DBFManager.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 32 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D88A5B39-4733-456D-8CBB-35AB0C2FEA0F} DBFManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{484F66B6-50EE-657B-A8E6-932C81A54D0B}\1.0\ = "RAServer 1.0 Type Library" DBFManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D88A5B39-4733-456D-8CBB-35AB0C2FEA0F}\ = "Obexecar.Memec" DBFManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D88A5B39-4733-456D-8CBB-35AB0C2FEA0F}\InprocServer32\ = "C:\\Windows\\SysWOW64\\AppIdPolicyEngineApi.dll" DBFManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D88A5B39-4733-456D-8CBB-35AB0C2FEA0F}\ProgID DBFManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{484F66B6-50EE-657B-A8E6-932C81A54D0B} DBFManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D88A5B39-4733-456D-8CBB-35AB0C2FEA0F}\TypeLib\ DBFManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D88A5B39-4733-456D-8CBB-35AB0C2FEA0F}\ProgID\ DBFManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{484F66B6-50EE-657B-A8E6-932C81A54D0B}\1.0\0 DBFManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{484F66B6-50EE-657B-A8E6-932C81A54D0B}\1.0\0\win32\ DBFManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D88A5B39-4733-456D-8CBB-35AB0C2FEA0F}\VersionIndependentProgID\ = "AppIdPolicyEngineApi.AppIdPolicyHelper" DBFManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{484F66B6-50EE-657B-A8E6-932C81A54D0B}\1.0\ DBFManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D88A5B39-4733-456D-8CBB-35AB0C2FEA0F}\TypeLib DBFManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D88A5B39-4733-456D-8CBB-35AB0C2FEA0F}\ProgID\ = "AppIdPolicyEngineApi.AppIdPolicyHelper.1" DBFManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{484F66B6-50EE-657B-A8E6-932C81A54D0B}\ DBFManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{484F66B6-50EE-657B-A8E6-932C81A54D0B}\1.0\FLAGS DBFManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{484F66B6-50EE-657B-A8E6-932C81A54D0B}\1.0\FLAGS\ = "0" DBFManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D88A5B39-4733-456D-8CBB-35AB0C2FEA0F}\InprocServer32 DBFManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D88A5B39-4733-456D-8CBB-35AB0C2FEA0F}\Programmable DBFManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D88A5B39-4733-456D-8CBB-35AB0C2FEA0F}\TypeLib\ = "{484F66B6-50EE-657B-A8E6-932C81A54D0B}" DBFManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D88A5B39-4733-456D-8CBB-35AB0C2FEA0F}\Version DBFManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D88A5B39-4733-456D-8CBB-35AB0C2FEA0F}\Version\ = "1.0" DBFManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D88A5B39-4733-456D-8CBB-35AB0C2FEA0F}\InprocServer32\ DBFManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{484F66B6-50EE-657B-A8E6-932C81A54D0B}\1.0\0\ DBFManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{484F66B6-50EE-657B-A8E6-932C81A54D0B}\1.0\0\win32 DBFManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{484F66B6-50EE-657B-A8E6-932C81A54D0B}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\RAServer.exe" DBFManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D88A5B39-4733-456D-8CBB-35AB0C2FEA0F}\Version\ DBFManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D88A5B39-4733-456D-8CBB-35AB0C2FEA0F}\Programmable\ DBFManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{484F66B6-50EE-657B-A8E6-932C81A54D0B}\1.0 DBFManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{484F66B6-50EE-657B-A8E6-932C81A54D0B}\1.0\FLAGS\ DBFManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D88A5B39-4733-456D-8CBB-35AB0C2FEA0F}\VersionIndependentProgID DBFManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D88A5B39-4733-456D-8CBB-35AB0C2FEA0F}\VersionIndependentProgID\ DBFManager.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2448 DBFManager.exe 2448 DBFManager.exe 2448 DBFManager.exe 2448 DBFManager.exe