Overview
overview
10Static
static
10BearFlix\BearFlix.exe
windows7-x64
9BearFlix\BearFlix.exe
windows10-2004-x64
9BearFlix\data.exe
windows7-x64
1BearFlix\data.exe
windows10-2004-x64
3BearFlix\libcef.exe
windows7-x64
9BearFlix\libcef.exe
windows10-2004-x64
9BearFlix\strip.exe
windows7-x64
9BearFlix\strip.exe
windows10-2004-x64
9BruteFlix ...ed.exe
windows7-x64
9BruteFlix ...ed.exe
windows10-2004-x64
9BruteFlix ...le.dll
windows7-x64
1BruteFlix ...le.dll
windows10-2004-x64
1BruteFlix ...et.dll
windows7-x64
1BruteFlix ...et.dll
windows10-2004-x64
1BruteFlix ...on.dll
windows7-x64
1BruteFlix ...on.dll
windows10-2004-x64
1BruteFlix ...ta.exe
windows7-x64
9BruteFlix ...ta.exe
windows10-2004-x64
9BruteFlix ...ef.exe
windows7-x64
9BruteFlix ...ef.exe
windows10-2004-x64
9BruteFlix ...ec.exe
windows7-x64
1BruteFlix ...ec.exe
windows10-2004-x64
3Dark Star ...32.dll
windows7-x64
3Dark Star ...32.dll
windows10-2004-x64
3Dark Star ...64.dll
windows7-x64
1Dark Star ...64.dll
windows10-2004-x64
1Dark Star ...io.exe
windows7-x64
9Dark Star ...io.exe
windows10-2004-x64
9Dark Star ...al.exe
windows7-x64
3Dark Star ...al.exe
windows10-2004-x64
3Dark Star ...32.exe
windows7-x64
1Dark Star ...32.exe
windows10-2004-x64
3Analysis
-
max time kernel
291s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 07:59
Static task
static1
Behavioral task
behavioral1
Sample
BearFlix\BearFlix.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
BearFlix\BearFlix.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral3
Sample
BearFlix\data.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
BearFlix\data.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral5
Sample
BearFlix\libcef.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
BearFlix\libcef.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral7
Sample
BearFlix\strip.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
BearFlix\strip.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral9
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\BruteFlix_protected.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\BruteFlix_protected.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral11
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\Colorful.Console.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\Colorful.Console.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral13
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\Leaf.xNet.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\Leaf.xNet.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral15
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\Newtonsoft.Json.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\Newtonsoft.Json.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral17
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\data.exe
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\data.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral19
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\libcef.exe
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\libcef.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral21
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\libexec.exe
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\libexec.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral23
Sample
Dark Star Netflix Checker By Scorpio\Bunifu_UI_v15232.dll
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
Dark Star Netflix Checker By Scorpio\Bunifu_UI_v15232.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral25
Sample
Dark Star Netflix Checker By Scorpio\Bunifu_UI_v15264.dll
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
Dark Star Netflix Checker By Scorpio\Bunifu_UI_v15264.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral27
Sample
Dark Star Netflix Checker By Scorpio\Netflix Checker By Scorpio.exe
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
Dark Star Netflix Checker By Scorpio\Netflix Checker By Scorpio.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral29
Sample
Dark Star Netflix Checker By Scorpio\alocal.exe
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
Dark Star Netflix Checker By Scorpio\alocal.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral31
Sample
Dark Star Netflix Checker By Scorpio\database32.exe
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
Dark Star Netflix Checker By Scorpio\database32.exe
Resource
win10v2004-20240730-en
General
-
Target
BearFlix\BearFlix.exe
-
Size
393KB
-
MD5
219cc860813f9cdfad1e7e45a19da1a4
-
SHA1
e7d27e4b0441283acc06b8270de41918dbd9ec7a
-
SHA256
1422481834c140a96979b1618db835231b4e67475854c9a200fa08f0cdb02371
-
SHA512
c9d7419db07c3d6820ab5dddbcfdca1ba787e6d4777248354d4f596987f9eb9bdd301ab6a102a95469c8031bf259cd9e0f58fca64df30d01861150a952574fc4
-
SSDEEP
6144:GfUXZAwseFnp0Ak27gU6bF8ViOAOupdDCXPaKFh:GsJrrFnphE78IOQWXPaEh
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
winsrvhost.exestrip.cfgdescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ winsrvhost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ strip.cfg -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
winsrvhost.exestrip.cfgdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion winsrvhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion winsrvhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion strip.cfg Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion strip.cfg -
Executes dropped EXE 2 IoCs
Processes:
UserOOOBE.exewinsrvhost.exepid process 2456 UserOOOBE.exe 1924 winsrvhost.exe -
Loads dropped DLL 5 IoCs
Processes:
BearFlix.exestrip.cfgpid process 2912 BearFlix.exe 2912 BearFlix.exe 2912 BearFlix.exe 2912 BearFlix.exe 2356 strip.cfg -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/2356-27-0x0000000000310000-0x0000000000A22000-memory.dmp agile_net -
Processes:
resource yara_rule C:\ProgramData\winsrvhost\winsrvhost.exe themida behavioral1/memory/1924-26-0x00000000012C0000-0x000000000171B000-memory.dmp themida behavioral1/memory/1924-25-0x00000000012C0000-0x000000000171B000-memory.dmp themida behavioral1/memory/1924-24-0x00000000012C0000-0x000000000171B000-memory.dmp themida behavioral1/memory/1924-23-0x00000000012C0000-0x000000000171B000-memory.dmp themida behavioral1/memory/1924-22-0x00000000012C0000-0x000000000171B000-memory.dmp themida behavioral1/memory/1924-21-0x00000000012C0000-0x000000000171B000-memory.dmp themida behavioral1/memory/1924-20-0x00000000012C0000-0x000000000171B000-memory.dmp themida behavioral1/memory/1924-19-0x00000000012C0000-0x000000000171B000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\2e082fe2-809f-4139-90cf-9dcb3fb2c4b1\AgileDotNetRT.dll themida behavioral1/memory/2356-34-0x000000006FC40000-0x0000000070259000-memory.dmp themida behavioral1/memory/2356-35-0x000000006FC40000-0x0000000070259000-memory.dmp themida behavioral1/memory/2356-36-0x000000006FC40000-0x0000000070259000-memory.dmp themida behavioral1/memory/1924-39-0x00000000012C0000-0x000000000171B000-memory.dmp themida behavioral1/memory/2356-38-0x000000006FC40000-0x0000000070259000-memory.dmp themida -
Processes:
winsrvhost.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winsrvhost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
strip.cfgpid process 2356 strip.cfg -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2808 2356 WerFault.exe strip.cfg -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
winsrvhost.exestrip.cfgBearFlix.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winsrvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language strip.cfg Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BearFlix.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
BearFlix.exestrip.cfgdescription pid process target process PID 2912 wrote to memory of 2456 2912 BearFlix.exe UserOOOBE.exe PID 2912 wrote to memory of 2456 2912 BearFlix.exe UserOOOBE.exe PID 2912 wrote to memory of 2456 2912 BearFlix.exe UserOOOBE.exe PID 2912 wrote to memory of 2456 2912 BearFlix.exe UserOOOBE.exe PID 2912 wrote to memory of 2356 2912 BearFlix.exe strip.cfg PID 2912 wrote to memory of 2356 2912 BearFlix.exe strip.cfg PID 2912 wrote to memory of 2356 2912 BearFlix.exe strip.cfg PID 2912 wrote to memory of 2356 2912 BearFlix.exe strip.cfg PID 2912 wrote to memory of 1924 2912 BearFlix.exe winsrvhost.exe PID 2912 wrote to memory of 1924 2912 BearFlix.exe winsrvhost.exe PID 2912 wrote to memory of 1924 2912 BearFlix.exe winsrvhost.exe PID 2912 wrote to memory of 1924 2912 BearFlix.exe winsrvhost.exe PID 2356 wrote to memory of 2808 2356 strip.cfg WerFault.exe PID 2356 wrote to memory of 2808 2356 strip.cfg WerFault.exe PID 2356 wrote to memory of 2808 2356 strip.cfg WerFault.exe PID 2356 wrote to memory of 2808 2356 strip.cfg WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\BearFlix\BearFlix.exe"C:\Users\Admin\AppData\Local\Temp\BearFlix\BearFlix.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\ProgramData\UserOOOBE\UserOOOBE.exeC:\ProgramData\\UserOOOBE\\UserOOOBE.exe ,.2⤵
- Executes dropped EXE
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\BearFlix\strip.cfgstrip.cfg2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2356 -s 6523⤵
- Program crash
PID:2808 -
C:\ProgramData\winsrvhost\winsrvhost.exeC:\ProgramData\\winsrvhost\\winsrvhost.exe fUhKJYNVptKDkRc4TZ8i2qrNArpfQ0KW3bLpDrGQYVEtTff7fRL4tmxadfEipHsp2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:1924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD5a553208ea4a57f1334669fe1e80113b7
SHA1509aebd8384adb5f0d5f37dd3dd2b799ca7ddae6
SHA256c868a800bef638fd579202534fa763a584cf78a01447afc89908ed1bae308ace
SHA51208765ce1ed9d095527b469495b2138e6446c9034916f4030e7c02c43ea7b39708c1d3cd4f35c9df156633e77cdcb702258f7d627c028c902ac3f450dd0643eef
-
Filesize
2.3MB
MD5105e678e6ee84e0fa7fbe34df1f9639c
SHA117e4d775f4405e3a81a793b5bf775e9c95da5af9
SHA2564ef4551d44fde6e46c470314b0b89f6418a54eee3f1ad9eb7456b2a20e3065a2
SHA5123a15a2f188a4f572923d1999a77ef6d14b243d1c0e3a4442b5a6825756b93b40e2c6197d106df62ae3b427c62ff6b21fc2fe8181a3b6709e9991f1ddd36e5689
-
Filesize
1.6MB
MD5939712a4d4341fb67c0214621a78fca7
SHA153225cb2d07e8131c9fdb086a70a81cd41f588ea
SHA256f594ff49ea0a51dc4a76609291b7c3e44fcc92789378f899349609407ac55b61
SHA512f9cd9997394dae980b99018902e347a48b4eab44041e88bad6fc3d10c173b31cea44b0202e7233b1dc934c102c27f1ce5662a01e53b1b0f80197c9c73bb24144