Overview
overview
10Static
static
10BearFlix\BearFlix.exe
windows7-x64
9BearFlix\BearFlix.exe
windows10-2004-x64
9BearFlix\data.exe
windows7-x64
1BearFlix\data.exe
windows10-2004-x64
3BearFlix\libcef.exe
windows7-x64
9BearFlix\libcef.exe
windows10-2004-x64
9BearFlix\strip.exe
windows7-x64
9BearFlix\strip.exe
windows10-2004-x64
9BruteFlix ...ed.exe
windows7-x64
9BruteFlix ...ed.exe
windows10-2004-x64
9BruteFlix ...le.dll
windows7-x64
1BruteFlix ...le.dll
windows10-2004-x64
1BruteFlix ...et.dll
windows7-x64
1BruteFlix ...et.dll
windows10-2004-x64
1BruteFlix ...on.dll
windows7-x64
1BruteFlix ...on.dll
windows10-2004-x64
1BruteFlix ...ta.exe
windows7-x64
9BruteFlix ...ta.exe
windows10-2004-x64
9BruteFlix ...ef.exe
windows7-x64
9BruteFlix ...ef.exe
windows10-2004-x64
9BruteFlix ...ec.exe
windows7-x64
1BruteFlix ...ec.exe
windows10-2004-x64
3Dark Star ...32.dll
windows7-x64
3Dark Star ...32.dll
windows10-2004-x64
3Dark Star ...64.dll
windows7-x64
1Dark Star ...64.dll
windows10-2004-x64
1Dark Star ...io.exe
windows7-x64
9Dark Star ...io.exe
windows10-2004-x64
9Dark Star ...al.exe
windows7-x64
3Dark Star ...al.exe
windows10-2004-x64
3Dark Star ...32.exe
windows7-x64
1Dark Star ...32.exe
windows10-2004-x64
3Analysis
-
max time kernel
291s -
max time network
277s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 07:59
Static task
static1
Behavioral task
behavioral1
Sample
BearFlix\BearFlix.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
BearFlix\BearFlix.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral3
Sample
BearFlix\data.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
BearFlix\data.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral5
Sample
BearFlix\libcef.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
BearFlix\libcef.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral7
Sample
BearFlix\strip.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
BearFlix\strip.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral9
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\BruteFlix_protected.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\BruteFlix_protected.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral11
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\Colorful.Console.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\Colorful.Console.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral13
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\Leaf.xNet.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\Leaf.xNet.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral15
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\Newtonsoft.Json.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\Newtonsoft.Json.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral17
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\data.exe
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\data.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral19
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\libcef.exe
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\libcef.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral21
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\libexec.exe
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\libexec.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral23
Sample
Dark Star Netflix Checker By Scorpio\Bunifu_UI_v15232.dll
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
Dark Star Netflix Checker By Scorpio\Bunifu_UI_v15232.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral25
Sample
Dark Star Netflix Checker By Scorpio\Bunifu_UI_v15264.dll
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
Dark Star Netflix Checker By Scorpio\Bunifu_UI_v15264.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral27
Sample
Dark Star Netflix Checker By Scorpio\Netflix Checker By Scorpio.exe
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
Dark Star Netflix Checker By Scorpio\Netflix Checker By Scorpio.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral29
Sample
Dark Star Netflix Checker By Scorpio\alocal.exe
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
Dark Star Netflix Checker By Scorpio\alocal.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral31
Sample
Dark Star Netflix Checker By Scorpio\database32.exe
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
Dark Star Netflix Checker By Scorpio\database32.exe
Resource
win10v2004-20240730-en
General
-
Target
Dark Star Netflix Checker By Scorpio\Netflix Checker By Scorpio.exe
-
Size
408KB
-
MD5
0db447aeb70b31d758bbf420a70cfc09
-
SHA1
599997e1ddc208cf8b566601d13d2dc03a641661
-
SHA256
44612ea7656b2170978ab78ccf2cd3440bdd3164e4ccbc6be34eaf9b7b6036ba
-
SHA512
aa09275fbe90a15e31ba75f6e8729dda411a0efa0dafc927a12c088f4d085e4196ecf73dade2b349efa8f34b3fd1afb7aebb4c874216fc50c81ba9577c66a21d
-
SSDEEP
6144:CNUjZUwpfFnp0Ak27gU6bF8VWOAOapvlq/aKFh:C2FHRFnphE78EOMRiaEh
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ winsrvhost.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion winsrvhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion winsrvhost.exe -
Executes dropped EXE 2 IoCs
pid Process 3272 UserOOOBE.exe 2932 winsrvhost.exe -
resource yara_rule behavioral28/files/0x0007000000023689-14.dat themida behavioral28/memory/2932-15-0x0000000000540000-0x000000000099B000-memory.dmp themida behavioral28/memory/2932-16-0x0000000000540000-0x000000000099B000-memory.dmp themida behavioral28/memory/2932-18-0x0000000000540000-0x000000000099B000-memory.dmp themida behavioral28/memory/2932-23-0x0000000000540000-0x000000000099B000-memory.dmp themida behavioral28/memory/2932-22-0x0000000000540000-0x000000000099B000-memory.dmp themida behavioral28/memory/2932-21-0x0000000000540000-0x000000000099B000-memory.dmp themida behavioral28/memory/2932-20-0x0000000000540000-0x000000000099B000-memory.dmp themida behavioral28/memory/2932-17-0x0000000000540000-0x000000000099B000-memory.dmp themida behavioral28/memory/2932-38-0x0000000000540000-0x000000000099B000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winsrvhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Netflix Checker By Scorpio.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UserOOOBE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alocal.cfg Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winsrvhost.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1296 wrote to memory of 3272 1296 Netflix Checker By Scorpio.exe 85 PID 1296 wrote to memory of 3272 1296 Netflix Checker By Scorpio.exe 85 PID 1296 wrote to memory of 3272 1296 Netflix Checker By Scorpio.exe 85 PID 1296 wrote to memory of 4792 1296 Netflix Checker By Scorpio.exe 86 PID 1296 wrote to memory of 4792 1296 Netflix Checker By Scorpio.exe 86 PID 1296 wrote to memory of 4792 1296 Netflix Checker By Scorpio.exe 86 PID 1296 wrote to memory of 2932 1296 Netflix Checker By Scorpio.exe 87 PID 1296 wrote to memory of 2932 1296 Netflix Checker By Scorpio.exe 87 PID 1296 wrote to memory of 2932 1296 Netflix Checker By Scorpio.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\Dark Star Netflix Checker By Scorpio\Netflix Checker By Scorpio.exe"C:\Users\Admin\AppData\Local\Temp\Dark Star Netflix Checker By Scorpio\Netflix Checker By Scorpio.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\ProgramData\UserOOOBE\UserOOOBE.exeC:\ProgramData\\UserOOOBE\\UserOOOBE.exe ,.2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3272
-
-
C:\Users\Admin\AppData\Local\Temp\Dark Star Netflix Checker By Scorpio\alocal.cfgalocal.cfg2⤵
- System Location Discovery: System Language Discovery
PID:4792
-
-
C:\ProgramData\winsrvhost\winsrvhost.exeC:\ProgramData\\winsrvhost\\winsrvhost.exe Wqk2rAO4IpXlg1XJMm8wBykXCSyic66bpGESFJmH2FvZc9iZfTadXj5mKHASWYeq2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:2932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5939712a4d4341fb67c0214621a78fca7
SHA153225cb2d07e8131c9fdb086a70a81cd41f588ea
SHA256f594ff49ea0a51dc4a76609291b7c3e44fcc92789378f899349609407ac55b61
SHA512f9cd9997394dae980b99018902e347a48b4eab44041e88bad6fc3d10c173b31cea44b0202e7233b1dc934c102c27f1ce5662a01e53b1b0f80197c9c73bb24144
-
Filesize
3.0MB
MD5a553208ea4a57f1334669fe1e80113b7
SHA1509aebd8384adb5f0d5f37dd3dd2b799ca7ddae6
SHA256c868a800bef638fd579202534fa763a584cf78a01447afc89908ed1bae308ace
SHA51208765ce1ed9d095527b469495b2138e6446c9034916f4030e7c02c43ea7b39708c1d3cd4f35c9df156633e77cdcb702258f7d627c028c902ac3f450dd0643eef