Overview
overview
7Static
static
7b93c35345e...ed.exe
windows7-x64
7b93c35345e...ed.exe
windows10-2004-x64
7$PLUGINSDIR/BI.exe
windows7-x64
7$PLUGINSDIR/BI.exe
windows10-2004-x64
7$PLUGINSDI...CC.exe
windows7-x64
7$PLUGINSDI...CC.exe
windows10-2004-x64
7$PLUGINSDI...lp.dll
windows7-x64
3$PLUGINSDI...lp.dll
windows10-2004-x64
3$PLUGINSDI...er.exe
windows7-x64
7$PLUGINSDI...er.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...PIE.js
windows7-x64
3$PLUGINSDI...PIE.js
windows10-2004-x64
3$PLUGINSDI...ed.htm
windows7-x64
3$PLUGINSDI...ed.htm
windows10-2004-x64
3$PLUGINSDI...API.js
windows7-x64
3$PLUGINSDI...API.js
windows10-2004-x64
3$PLUGINSDI...ams.js
windows7-x64
3$PLUGINSDI...ams.js
windows10-2004-x64
3$PLUGINSDI...PIE.js
windows7-x64
3$PLUGINSDI...PIE.js
windows10-2004-x64
3$PLUGINSDI...Bar.js
windows7-x64
3$PLUGINSDI...Bar.js
windows10-2004-x64
3$PLUGINSDI...ore.js
windows7-x64
3$PLUGINSDI...ore.js
windows10-2004-x64
3$PLUGINSDI...min.js
windows7-x64
3$PLUGINSDI...min.js
windows10-2004-x64
3$PLUGINSDI...on2.js
windows7-x64
3$PLUGINSDI...on2.js
windows10-2004-x64
3$PLUGINSDI...ipt.js
windows7-x64
3$PLUGINSDI...ipt.js
windows10-2004-x64
3Analysis
-
max time kernel
92s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/08/2024, 02:19
Behavioral task
behavioral1
Sample
b93c35345e40b1a3cb3170cb341e41a91186141fc70d6cc5078e73c11e3f60ed.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b93c35345e40b1a3cb3170cb341e41a91186141fc70d6cc5078e73c11e3f60ed.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/BI.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BI.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/DownloadACC.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/DownloadACC.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/OCSetupHlp.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/OCSetupHlp.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/ProxyInstaller.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/ProxyInstaller.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/WebApp/Css/PIE.js
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/WebApp/Css/PIE.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/WebApp/Failed.htm
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/WebApp/Failed.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/WebApp/Js/API.js
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/WebApp/Js/API.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/WebApp/Js/ExternalParams.js
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/WebApp/Js/ExternalParams.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/WebApp/Js/PIE.js
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/WebApp/Js/PIE.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/WebApp/Js/ProgressBar.js
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/WebApp/Js/ProgressBar.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/WebApp/Js/Store.js
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/WebApp/Js/Store.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/WebApp/Js/jquery-ui-1.8.16.custom.min.js
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/WebApp/Js/jquery-ui-1.8.16.custom.min.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/WebApp/Js/json2.js
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/WebApp/Js/json2.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/WebApp/Js/script.js
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/WebApp/Js/script.js
Resource
win10v2004-20240802-en
General
-
Target
b93c35345e40b1a3cb3170cb341e41a91186141fc70d6cc5078e73c11e3f60ed.exe
-
Size
1.2MB
-
MD5
9313cdb6e8124dec24470307843f02df
-
SHA1
3de7512e65e91d8d766bc9338ddd2ff91c53c98f
-
SHA256
b93c35345e40b1a3cb3170cb341e41a91186141fc70d6cc5078e73c11e3f60ed
-
SHA512
54bac79d785ef0fde7f072b084a672b7aaf0d9bd0d1a44c097ce96df1593ecec9b9783d4d3fc634efdbc5b2e091039a6a00fac0f12be5bd49267b784d768bec6
-
SSDEEP
24576:rXK/nIuooIjkFWpjzwkePXHf+2g0NJMtrrqhv/FamcY:TInIRRjkke/HW4CrO1amcY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3788 BI.exe -
Loads dropped DLL 6 IoCs
pid Process 1948 b93c35345e40b1a3cb3170cb341e41a91186141fc70d6cc5078e73c11e3f60ed.exe 1948 b93c35345e40b1a3cb3170cb341e41a91186141fc70d6cc5078e73c11e3f60ed.exe 3788 BI.exe 3788 BI.exe 3788 BI.exe 1948 b93c35345e40b1a3cb3170cb341e41a91186141fc70d6cc5078e73c11e3f60ed.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 456 1948 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b93c35345e40b1a3cb3170cb341e41a91186141fc70d6cc5078e73c11e3f60ed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BI.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1948 b93c35345e40b1a3cb3170cb341e41a91186141fc70d6cc5078e73c11e3f60ed.exe 1948 b93c35345e40b1a3cb3170cb341e41a91186141fc70d6cc5078e73c11e3f60ed.exe 1948 b93c35345e40b1a3cb3170cb341e41a91186141fc70d6cc5078e73c11e3f60ed.exe 1948 b93c35345e40b1a3cb3170cb341e41a91186141fc70d6cc5078e73c11e3f60ed.exe 1948 b93c35345e40b1a3cb3170cb341e41a91186141fc70d6cc5078e73c11e3f60ed.exe 1948 b93c35345e40b1a3cb3170cb341e41a91186141fc70d6cc5078e73c11e3f60ed.exe 1948 b93c35345e40b1a3cb3170cb341e41a91186141fc70d6cc5078e73c11e3f60ed.exe 1948 b93c35345e40b1a3cb3170cb341e41a91186141fc70d6cc5078e73c11e3f60ed.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1948 wrote to memory of 3788 1948 b93c35345e40b1a3cb3170cb341e41a91186141fc70d6cc5078e73c11e3f60ed.exe 85 PID 1948 wrote to memory of 3788 1948 b93c35345e40b1a3cb3170cb341e41a91186141fc70d6cc5078e73c11e3f60ed.exe 85 PID 1948 wrote to memory of 3788 1948 b93c35345e40b1a3cb3170cb341e41a91186141fc70d6cc5078e73c11e3f60ed.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\b93c35345e40b1a3cb3170cb341e41a91186141fc70d6cc5078e73c11e3f60ed.exe"C:\Users\Admin\AppData\Local\Temp\b93c35345e40b1a3cb3170cb341e41a91186141fc70d6cc5078e73c11e3f60ed.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\nse6B5D.tmp\BI.exeC:\Users\Admin\AppData\Local\Temp\nse6B5D.tmp\BI.exe { "json_send_time" : "7/8/2024 4:19:24:835" , "product_id_version" : "" , "product_type" : "" , "product_id" : "" , "offer_id" : "3509" , "user_type" : "NULL" , "result" : "Success" , "user_operating_system_bits" : "" , "current_default_search" : "" , "current_homepage" : "" , "current_toolbars" : "" , "attempt_number" : "1" , "is_silent" : "" , "user_ms_dotnet_framework_ver" : "" , "user_acount_type" : "" , "user_ie_version" : "" , "user_default_browser_version" : "" , "user_default_browser" : "" , "user_service_pack" : "" , "user_operating_system" : "" , "revision_number" : "0" , "build_id" : "00000000" , "dm_version" : "1.3.7.7_HF10" , "bundle_id" : "66b0f514-3426-4116-8727-cceb8ef5f35c" , "machine_user_id" : "{9B09EB23-ACB3-4863-9A8F-BF3070610145}" , "send_attempt" : "0" , "channel_id" : "" , "installation_session_id" : "F9A84153-9327-46B2-91E0-8D369CB324D0" , "publisher_internal_id" : "1" , "publisher_id" : "Brothersoft" , "publisher_account_id" : "Brothersoft" , "order" : "1.0" , "phase" : "Init" , "Is_Test" : "0" }2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1948 -s 23162⤵
- Program crash
PID:456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1948 -ip 19481⤵PID:668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD5c6606a373ecde7cfd604b9970c84edd0
SHA12ade77df0b5b02b60a98f60328914c44fb4e0e11
SHA256e30c962b128d554c672d8f332874f43443529fa7c9cc2165affe403f14d83bb6
SHA5128379c676d1fb229cf6661c07b9a14fc782261d6b74b35aff3223fdb9b7fe7afb1b33e6205ae35e420da80a22ed30d5b4f3daa6ef19c975caa7d44ea2a44499b4
-
Filesize
17KB
MD5ea466672af35f704f1e8738ce4381857
SHA1245a02c01302cf0151c07d915f028e3d822846da
SHA25654e5770328d8bc66ae751cba53eed2988cff81d9a0c627e006ee8de01ba71ed3
SHA512619619a5fca42129087b597ef8ff3acb6f423e5c0f6add72d6c2709e6018c66933e16678dcc6e5716f191763cb23929f7cd8ae700f8c919bfa08fad8193dede2
-
Filesize
9KB
MD50c1797a7fe8c65cf36ca5bc35aad0ff7
SHA1b2754700c45211e641a59c1ddf55f47d55d43bdc
SHA25685ec98a0fc8ff6c202e0a01142814a5a5438a71636a4025a2a8506cc7b22edba
SHA51276e5eefc894f815099e8360d89253505b8f29974b71d63e0a5e0636e6db9f8793bf11e992140b89d478a856402741222ad0bf2acff72f95d13fb60b370b13231
-
Filesize
3KB
MD59b8cf1c97726c080629c98ddec68bebd
SHA15d764a5bc2e5cbb5f2569336e4c0c5f472d07f35
SHA2561b6c626d6a600be68b11133c7bcd32fbcc8015951037bb36beaa067914367715
SHA51267c590d216e73d0dd58974567dc248e0adb363c59e318efe1e715960a38220c1cfb98328cdb69941888f9e039d60980fd1fcf11084498fcb46f80c135cb60d24
-
Filesize
2KB
MD5ae7d8dbeda4f6376cac9fc1cbc11a0e8
SHA181e4d2b55dcff72073e77b2b9017bbed2f0d511c
SHA25683e84faa4aadddd16ba2602aa6dd113c8bc6b5d5d9606d90552af16d77f5ead2
SHA512b68a696eb672e8f23c36c5e56ce37a2cf48da86027abe2c250110974d1c4811322139117004cea3ba5836638fba19a73788be01a83cc1099bdf01bde3f3982fa
-
Filesize
29KB
MD5392f88a1357c739c0825d4fa26fb5286
SHA102646547510dcfa5e44d461ae0fa50a2273f1010
SHA25666d111ed5526e6c43956ea615254bf140eee4c3f07521ee9a1d6f6e760821949
SHA51279909b909aac3f1a7fb36ee7b3702877b1bf588821df1a0aedcb0f033ff6087dd22ea38408a1505e86c8a300e6b32309924bee901d31f92cf15d697b9a9dcce5
-
Filesize
705KB
MD50ce8403515ce7835755e23241f833eb6
SHA1a2bcbb0cc429598dbfe74647d72908c7a7ffcfc2
SHA256244d24ccdd4cda723c16d0b47a8c0f42c74b33280c6a7c628010e14c894d10cc
SHA512924e4c9966c50338e9ed2cd93a093c03e6665ec09dbc1722e78edfbd048f0d2f2b637c99eb8abf9e35608eb63bbc890292dbbb7d3b5b175f6e71c967aebe5993
-
Filesize
28KB
MD5dbcd04e7c6a999318e15345ee807be40
SHA10f62900856b3c57c595efd83677d0d78f54dfe70
SHA256b218830ef6006dd1ca5bfde770c859b5f4dcd01a9636b32355340d16dcc34546
SHA512c56af6635032896b60235975226e911d104f59171aac9a8dd7a339e7c63a110737d14670320e7e1dddc210f7a0d35dccf949932f67c0946048c256e1b4064c1e