Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    10-08-2024 23:11

General

  • Target

    BkavPro.exe

  • Size

    760KB

  • MD5

    abf09a2221c6b58aca0aadba05f3cd56

  • SHA1

    fa6969642f333241c89971089b63e4ff03aac42f

  • SHA256

    731322b300479fe1e35a50e7069f504c2c4b359a000b29ea7500c9bcfab7a65b

  • SHA512

    64b1f64daed76832202576fcd314b39575e0dbca461a41c67afac8ccc6056868456217a06df8201653e7ac3282f88e658bf5389cd97a914250b1c5774f27776f

  • SSDEEP

    12288:OzAKNddaW7znYhASli1aRpsZIhBzLm6sZyGywn4N5AbH/6lRGi+jCakR:OzhdPkhASjsZKJm6sZyGyPXAbfmRGiA2

Malware Config

Signatures

  • Drops file in Drivers directory 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Loads dropped DLL 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BkavPro.exe
    "C:\Users\Admin\AppData\Local\Temp\BkavPro.exe"
    1⤵
    • Drops file in Drivers directory
    • Adds Run key to start application
    • Drops file in Windows directory
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:292
    • C:\Windows\system32\runonce.exe
      "C:\Windows\system32\runonce.exe" -r
      2⤵
      • Checks processor information in registry
      PID:1736
    • C:\Windows\SysWOW64\CMD.EXE
      CMD.EXE /c fltmc load BkavSetupSd
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2376
      • C:\Windows\SysWOW64\fltMC.exe
        fltmc load BkavSetupSd
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: LoadsDriver
        • Suspicious use of AdjustPrivilegeToken
        PID:2468

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Bka931B.tmp\BkavSetupSd.sys

    Filesize

    47KB

    MD5

    803215483971d91b42f10b00d89df0f5

    SHA1

    fae95849e25374780576d2270cffbd82dde20ce7

    SHA256

    5612490c30e55792b0ab380f058ebf7666c0c3b9207cd58ec7527cfb34e16fc2

    SHA512

    139f3077776c7678cb20c71bbeae41d7b35587b6e87de75637d5d2bce7ae223fc2ee5435d002fff44d7a4307e9755e9cdc9a77c83f621f1ec7cbf76a578b0381

  • C:\Users\Admin\AppData\Local\Temp\Cab9F4E.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar9F61.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\WinHTTPLib.log

    Filesize

    3KB

    MD5

    bd8a5f061d02cf0d4041c1035b4cffaf

    SHA1

    48a3a4f5d6d5270725b690a749c57928f9513238

    SHA256

    55ed1fb2ed91d6066e98262577941c3e925a04ff5a53965917b901916f215ede

    SHA512

    13a98cb87eedd375749f846193427710cfa1efda1f3878444cfe96cea625e7fdf9fd7331bf87f38d11e603e147e11d16c3416644eb9e6bc86da9a7f4b033a115

  • C:\WinHTTPLib.log

    Filesize

    4KB

    MD5

    3aadfc93680dc0c79083a0d819063cf9

    SHA1

    dbde1d5e598edbbc9a0d471f4137b8ce18f3f563

    SHA256

    ae8fbfdfecb8265187c10c247f978add3c4a4d1b48d65c760b5617823c7e397b

    SHA512

    edb665f4a19bd817371b132a6919557820a87a874527aeb9f90764825d4176b278d6b2b397030bd952a354a020cc91c95d798284b1cb052492224c3e0414baef

  • C:\WinHTTPLib.log

    Filesize

    2KB

    MD5

    7a3c6aca47b2adb6e6583c5b1c144908

    SHA1

    04434e967c8b3c9b0a8ca7010b1641abb64efb00

    SHA256

    7adc22dd2c8a903d08fad6af0de81362be3f68d27019d102338b592021fa3275

    SHA512

    1ad3f956a2a28c3d4d9298bbd01ae2ea797105b76e56ae1844e1712d1fd7dd587827158a0b8ad2736033baba8af58f8c6b2eadbeaac3d707346abe55b747f863

  • \Users\Admin\AppData\Local\Temp\crypt32.dll

    Filesize

    1.4MB

    MD5

    3f9f2afa135f0663946a006dd5ffd897

    SHA1

    ea6456859b04b68af8dcd453381dd168af53fc5e

    SHA256

    276d1c9c78c529625c2ef3d77079324628686ea184767971901a1de93681c133

    SHA512

    8a57ce747909004aa101644734c0fb7cbc8b4482874869e5259ec92b1ef613c4985f8a0a3f362e777519ee2e2948c2579c7498f3060818bf17bc38162180ccbf