Overview
overview
10Static
static
10BearFlix\BearFlix.exe
windows7-x64
9BearFlix\BearFlix.exe
windows10-2004-x64
9BearFlix\data.exe
windows7-x64
1BearFlix\data.exe
windows10-2004-x64
3BearFlix\libcef.exe
windows7-x64
9BearFlix\libcef.exe
windows10-2004-x64
9BearFlix\strip.exe
windows7-x64
9BearFlix\strip.exe
windows10-2004-x64
9BruteFlix ...ed.exe
windows7-x64
9BruteFlix ...ed.exe
windows10-2004-x64
9BruteFlix ...le.dll
windows7-x64
1BruteFlix ...le.dll
windows10-2004-x64
1BruteFlix ...et.dll
windows7-x64
1BruteFlix ...et.dll
windows10-2004-x64
1BruteFlix ...on.dll
windows7-x64
1BruteFlix ...on.dll
windows10-2004-x64
1BruteFlix ...ta.exe
windows7-x64
9BruteFlix ...ta.exe
windows10-2004-x64
9BruteFlix ...ef.exe
windows7-x64
9BruteFlix ...ef.exe
windows10-2004-x64
9BruteFlix ...ec.exe
windows7-x64
1BruteFlix ...ec.exe
windows10-2004-x64
3Dark Star ...32.dll
windows7-x64
3Dark Star ...32.dll
windows10-2004-x64
3Dark Star ...64.dll
windows7-x64
1Dark Star ...64.dll
windows10-2004-x64
1Dark Star ...io.exe
windows7-x64
9Dark Star ...io.exe
windows10-2004-x64
9Dark Star ...al.exe
windows7-x64
3Dark Star ...al.exe
windows10-2004-x64
3Dark Star ...32.exe
windows7-x64
1Dark Star ...32.exe
windows10-2004-x64
3Analysis
-
max time kernel
293s -
max time network
281s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 07:59
Static task
static1
Behavioral task
behavioral1
Sample
BearFlix\BearFlix.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
BearFlix\BearFlix.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral3
Sample
BearFlix\data.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
BearFlix\data.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral5
Sample
BearFlix\libcef.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
BearFlix\libcef.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral7
Sample
BearFlix\strip.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
BearFlix\strip.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral9
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\BruteFlix_protected.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\BruteFlix_protected.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral11
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\Colorful.Console.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\Colorful.Console.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral13
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\Leaf.xNet.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\Leaf.xNet.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral15
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\Newtonsoft.Json.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\Newtonsoft.Json.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral17
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\data.exe
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\data.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral19
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\libcef.exe
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\libcef.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral21
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\libexec.exe
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\libexec.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral23
Sample
Dark Star Netflix Checker By Scorpio\Bunifu_UI_v15232.dll
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
Dark Star Netflix Checker By Scorpio\Bunifu_UI_v15232.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral25
Sample
Dark Star Netflix Checker By Scorpio\Bunifu_UI_v15264.dll
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
Dark Star Netflix Checker By Scorpio\Bunifu_UI_v15264.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral27
Sample
Dark Star Netflix Checker By Scorpio\Netflix Checker By Scorpio.exe
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
Dark Star Netflix Checker By Scorpio\Netflix Checker By Scorpio.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral29
Sample
Dark Star Netflix Checker By Scorpio\alocal.exe
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
Dark Star Netflix Checker By Scorpio\alocal.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral31
Sample
Dark Star Netflix Checker By Scorpio\database32.exe
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
Dark Star Netflix Checker By Scorpio\database32.exe
Resource
win10v2004-20240730-en
General
-
Target
BearFlix\BearFlix.exe
-
Size
393KB
-
MD5
219cc860813f9cdfad1e7e45a19da1a4
-
SHA1
e7d27e4b0441283acc06b8270de41918dbd9ec7a
-
SHA256
1422481834c140a96979b1618db835231b4e67475854c9a200fa08f0cdb02371
-
SHA512
c9d7419db07c3d6820ab5dddbcfdca1ba787e6d4777248354d4f596987f9eb9bdd301ab6a102a95469c8031bf259cd9e0f58fca64df30d01861150a952574fc4
-
SSDEEP
6144:GfUXZAwseFnp0Ak27gU6bF8ViOAOupdDCXPaKFh:GsJrrFnphE78IOQWXPaEh
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ winsrvhost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ strip.cfg -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion winsrvhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion strip.cfg Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion strip.cfg Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion winsrvhost.exe -
Executes dropped EXE 2 IoCs
pid Process 516 UserOOOBE.exe 3252 winsrvhost.exe -
Loads dropped DLL 1 IoCs
pid Process 3552 strip.cfg -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral2/memory/3552-23-0x0000000000490000-0x0000000000BA2000-memory.dmp agile_net -
resource yara_rule behavioral2/files/0x00070000000235e8-13.dat themida behavioral2/memory/3252-14-0x00000000006A0000-0x0000000000AFB000-memory.dmp themida behavioral2/memory/3252-16-0x00000000006A0000-0x0000000000AFB000-memory.dmp themida behavioral2/memory/3252-18-0x00000000006A0000-0x0000000000AFB000-memory.dmp themida behavioral2/memory/3252-17-0x00000000006A0000-0x0000000000AFB000-memory.dmp themida behavioral2/memory/3252-21-0x00000000006A0000-0x0000000000AFB000-memory.dmp themida behavioral2/memory/3252-22-0x00000000006A0000-0x0000000000AFB000-memory.dmp themida behavioral2/memory/3252-20-0x00000000006A0000-0x0000000000AFB000-memory.dmp themida behavioral2/memory/3252-19-0x00000000006A0000-0x0000000000AFB000-memory.dmp themida behavioral2/files/0x00070000000235ea-31.dat themida behavioral2/memory/3552-33-0x00000000719C0000-0x0000000071FD9000-memory.dmp themida behavioral2/memory/3552-35-0x00000000719C0000-0x0000000071FD9000-memory.dmp themida behavioral2/memory/3552-34-0x00000000719C0000-0x0000000071FD9000-memory.dmp themida behavioral2/memory/3552-38-0x00000000719C0000-0x0000000071FD9000-memory.dmp themida behavioral2/memory/3252-40-0x00000000006A0000-0x0000000000AFB000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winsrvhost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3552 strip.cfg -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 1644 3552 WerFault.exe 85 1668 3552 WerFault.exe 85 4128 3552 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BearFlix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UserOOOBE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language strip.cfg Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winsrvhost.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2220 wrote to memory of 516 2220 BearFlix.exe 84 PID 2220 wrote to memory of 516 2220 BearFlix.exe 84 PID 2220 wrote to memory of 516 2220 BearFlix.exe 84 PID 2220 wrote to memory of 3552 2220 BearFlix.exe 85 PID 2220 wrote to memory of 3552 2220 BearFlix.exe 85 PID 2220 wrote to memory of 3552 2220 BearFlix.exe 85 PID 2220 wrote to memory of 3252 2220 BearFlix.exe 86 PID 2220 wrote to memory of 3252 2220 BearFlix.exe 86 PID 2220 wrote to memory of 3252 2220 BearFlix.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\BearFlix\BearFlix.exe"C:\Users\Admin\AppData\Local\Temp\BearFlix\BearFlix.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\ProgramData\UserOOOBE\UserOOOBE.exeC:\ProgramData\\UserOOOBE\\UserOOOBE.exe ,.2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:516
-
-
C:\Users\Admin\AppData\Local\Temp\BearFlix\strip.cfgstrip.cfg2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3552 -s 10643⤵
- Program crash
PID:1644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3552 -s 11163⤵
- Program crash
PID:1668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3552 -s 11243⤵
- Program crash
PID:4128
-
-
-
C:\ProgramData\winsrvhost\winsrvhost.exeC:\ProgramData\\winsrvhost\\winsrvhost.exe 09Y6AKQAX6hG0NhUqMFisLK81XmpSpg3VcFEX7Clfm6HrBwBtPM90EJJaocrKCm02⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:3252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3552 -ip 35521⤵PID:4588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3552 -ip 35521⤵PID:808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3552 -ip 35521⤵PID:3068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5939712a4d4341fb67c0214621a78fca7
SHA153225cb2d07e8131c9fdb086a70a81cd41f588ea
SHA256f594ff49ea0a51dc4a76609291b7c3e44fcc92789378f899349609407ac55b61
SHA512f9cd9997394dae980b99018902e347a48b4eab44041e88bad6fc3d10c173b31cea44b0202e7233b1dc934c102c27f1ce5662a01e53b1b0f80197c9c73bb24144
-
Filesize
3.0MB
MD5a553208ea4a57f1334669fe1e80113b7
SHA1509aebd8384adb5f0d5f37dd3dd2b799ca7ddae6
SHA256c868a800bef638fd579202534fa763a584cf78a01447afc89908ed1bae308ace
SHA51208765ce1ed9d095527b469495b2138e6446c9034916f4030e7c02c43ea7b39708c1d3cd4f35c9df156633e77cdcb702258f7d627c028c902ac3f450dd0643eef
-
Filesize
2.3MB
MD5105e678e6ee84e0fa7fbe34df1f9639c
SHA117e4d775f4405e3a81a793b5bf775e9c95da5af9
SHA2564ef4551d44fde6e46c470314b0b89f6418a54eee3f1ad9eb7456b2a20e3065a2
SHA5123a15a2f188a4f572923d1999a77ef6d14b243d1c0e3a4442b5a6825756b93b40e2c6197d106df62ae3b427c62ff6b21fc2fe8181a3b6709e9991f1ddd36e5689