Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
04-08-2024 00:53
Behavioral task
behavioral1
Sample
brbbot.exe
Resource
win11-20240802-en
General
-
Target
brbbot.exe
-
Size
74KB
-
MD5
1c7243c8f3586b799a5f9a2e4200aa92
-
SHA1
4db5a8e237937b6d7b435a8506b8584121a7e9e3
-
SHA256
f47060d0f7de5ee651878eb18dd2d24b5003bdb03ef4f49879f448f05034a21e
-
SHA512
56cdf52cfcc102d2c8cc90e5a298eeaefd44002061108b0d6b330bb93c3590b3f8b2c3c4e1fa208fafeefa7dafa092bd0f57d3cf905382f88b9f66a5d84357fd
-
SSDEEP
1536:b6sMD3H8V3jsUnHLiREsTbDV/48OO4vh47483gLi9+LSG:b6srVzJiRrTHVORe75g4+LS
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
brbbot.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\brbbot = "C:\\Users\\Admin\\AppData\\Roaming\\brbbot.exe" brbbot.exe -
Drops file in Windows directory 4 IoCs
Processes:
UserOOBEBroker.exedescription ioc process File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
FileCoAuth.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FileCoAuth.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
msedge.exeWINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 4168 WINWORD.EXE 4168 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 34 IoCs
Processes:
brbbot.exemsedge.exemsedge.exepid process 328 brbbot.exe 328 brbbot.exe 328 brbbot.exe 328 brbbot.exe 328 brbbot.exe 328 brbbot.exe 328 brbbot.exe 328 brbbot.exe 328 brbbot.exe 328 brbbot.exe 328 brbbot.exe 328 brbbot.exe 328 brbbot.exe 328 brbbot.exe 328 brbbot.exe 328 brbbot.exe 328 brbbot.exe 328 brbbot.exe 328 brbbot.exe 328 brbbot.exe 328 brbbot.exe 328 brbbot.exe 328 brbbot.exe 328 brbbot.exe 328 brbbot.exe 328 brbbot.exe 328 brbbot.exe 328 brbbot.exe 328 brbbot.exe 328 brbbot.exe 2764 msedge.exe 2764 msedge.exe 3728 msedge.exe 3728 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
msedge.exepid process 2764 msedge.exe 2764 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
msedge.exepid process 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
msedge.exepid process 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
WINWORD.EXEpid process 4168 WINWORD.EXE 4168 WINWORD.EXE 4168 WINWORD.EXE 4168 WINWORD.EXE 4168 WINWORD.EXE 4168 WINWORD.EXE 4168 WINWORD.EXE 4168 WINWORD.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2764 wrote to memory of 3928 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 3928 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 4076 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 3728 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 3728 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 3864 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 3864 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 3864 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 3864 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 3864 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 3864 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 3864 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 3864 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 3864 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 3864 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 3864 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 3864 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 3864 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 3864 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 3864 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 3864 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 3864 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 3864 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 3864 2764 msedge.exe msedge.exe PID 2764 wrote to memory of 3864 2764 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\brbbot.exe"C:\Users\Admin\AppData\Local\Temp\brbbot.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:328
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:4800
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
PID:3764
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵
- System Location Discovery: System Language Discovery
PID:3980
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\ClearUpdate.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4168
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\WatchResize.svg1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff80b863cb8,0x7ff80b863cc8,0x7ff80b863cd82⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1860,10007768421006911084,2235620729470394665,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2012 /prefetch:22⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1860,10007768421006911084,2235620729470394665,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1860,10007768421006911084,2235620729470394665,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2548 /prefetch:82⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,10007768421006911084,2235620729470394665,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,10007768421006911084,2235620729470394665,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4352
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4600
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b0177afa818e013394b36a04cb111278
SHA1dbc5c47e7a7df24259d67edf5fbbfa1b1fae3fe5
SHA256ffc2c53bfd37576b435309c750a5b81580a076c83019d34172f6635ff20c2a9d
SHA512d3b9e3a0a99f191edcf33f3658abd3c88afbb12d7b14d3b421b72b74d551b64d2a13d07db94c90b85606198ee6c9e52072e1017f8c8c6144c03acf509793a9db
-
Filesize
152B
MD59af507866fb23dace6259791c377531f
SHA15a5914fc48341ac112bfcd71b946fc0b2619f933
SHA2565fb3ec65ce1e6f47694e56a07c63e3b8af9876d80387a71f1917deae690d069f
SHA512c58c963ecd2c53f0c427f91dc41d9b2a9b766f2e04d7dae5236cb3c769d1f048e4a342ea75e4a690f3a207baa1d3add672160c1f317abfe703fd1d2216b1baf7
-
Filesize
5KB
MD51f96587a15a42a61bb5f7a7ca4e34d78
SHA13fe8a4b933b45c6280eda8378d713a6947f3c899
SHA2560a4e479349731e75a75ba1092e7f42384c067d7e657d2b7a368898b4d09d3056
SHA512b2b7a93e5fa4863863d9c2008f6bd708d11d3976d46ce4161076e5b708b05e555370a0eaaf3372c1f1e136c73cd1a2cf87c63035feed27a68da6c83ca7f867c5
-
Filesize
5KB
MD59ed7c4b162614f168b4c3d89052ecad5
SHA1697c9b7c7bb2b04224ef2d8bec998b2c69207842
SHA256319eb28b4d68eb515e1d7ef77f1a45afcb4cc3fa5b61141994852f0a0dbecdaf
SHA512ac51d81ba9dd8446526185d23dba6a6dcededeadbb6d71c195372f06f852522a83ee5fbbedc299272301d301deaefdb22d70425590b5f08cc4388231d1026b2e
-
Filesize
10KB
MD51e52cea1d00250f6dc2a4c2f7da89876
SHA13caeb1fa79f0e1193731549ef214fbbb694faa9c
SHA256bf5873dfaf44d657b2f7a3f9a239a01ff20533e8ce38d916d76650a1070587f2
SHA512b6c0daf989ef411c9e55f070966ca8132e927e231f75582a743e58e4dd8604e8efe5b1eb138f41cb23058b345dd47df00c1b614b319e3d6f70c2027901f73fa5
-
Filesize
350B
MD5c473e0d52f987b7833f3f1d981081acd
SHA13211ed429005c825d5b1fc99b91d2675d1f2c82b
SHA256ab5627d07451c23a868216ac265328c92a0addf844a32c3660b9ca218852f311
SHA512e3d463644ee1a51c27822e629f525494f2d49774ef8cc12db8a5d78fa3dd94eb26baeffdbaf26a044aa61a066ce990c1c88efa4723fe3e0a2e189bd4295b200a
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e