Overview
overview
7Static
static
73a2b791a20...0N.exe
windows7-x64
73a2b791a20...0N.exe
windows10-2004-x64
7$PLUGINSDIR/BI.exe
windows7-x64
7$PLUGINSDIR/BI.exe
windows10-2004-x64
7$PLUGINSDI...CC.exe
windows7-x64
7$PLUGINSDI...CC.exe
windows10-2004-x64
7$PLUGINSDI...lp.dll
windows7-x64
3$PLUGINSDI...lp.dll
windows10-2004-x64
3$PLUGINSDI...er.exe
windows7-x64
7$PLUGINSDI...er.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...PIE.js
windows7-x64
3$PLUGINSDI...PIE.js
windows10-2004-x64
3$PLUGINSDI...ed.htm
windows7-x64
3$PLUGINSDI...ed.htm
windows10-2004-x64
3$PLUGINSDI...API.js
windows7-x64
3$PLUGINSDI...API.js
windows10-2004-x64
3$PLUGINSDI...ams.js
windows7-x64
3$PLUGINSDI...ams.js
windows10-2004-x64
3$PLUGINSDI...PIE.js
windows7-x64
3$PLUGINSDI...PIE.js
windows10-2004-x64
3$PLUGINSDI...Bar.js
windows7-x64
3$PLUGINSDI...Bar.js
windows10-2004-x64
3$PLUGINSDI...ore.js
windows7-x64
3$PLUGINSDI...ore.js
windows10-2004-x64
3$PLUGINSDI...min.js
windows7-x64
3$PLUGINSDI...min.js
windows10-2004-x64
3$PLUGINSDI...on2.js
windows7-x64
3$PLUGINSDI...on2.js
windows10-2004-x64
3$PLUGINSDI...ipt.js
windows7-x64
3$PLUGINSDI...ipt.js
windows10-2004-x64
3Analysis
-
max time kernel
107s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 10:34
Behavioral task
behavioral1
Sample
3a2b791a2030ff731887e9b1d87d4090N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3a2b791a2030ff731887e9b1d87d4090N.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/BI.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BI.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/DownloadACC.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/DownloadACC.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/OCSetupHlp.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/OCSetupHlp.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/ProxyInstaller.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/ProxyInstaller.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/WebApp/Css/PIE.js
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/WebApp/Css/PIE.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/WebApp/Failed.htm
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/WebApp/Failed.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/WebApp/Js/API.js
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/WebApp/Js/API.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/WebApp/Js/ExternalParams.js
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/WebApp/Js/ExternalParams.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/WebApp/Js/PIE.js
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/WebApp/Js/PIE.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/WebApp/Js/ProgressBar.js
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/WebApp/Js/ProgressBar.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/WebApp/Js/Store.js
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/WebApp/Js/Store.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/WebApp/Js/jquery-ui-1.8.16.custom.min.js
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/WebApp/Js/jquery-ui-1.8.16.custom.min.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/WebApp/Js/json2.js
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/WebApp/Js/json2.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/WebApp/Js/script.js
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/WebApp/Js/script.js
Resource
win10v2004-20240802-en
General
-
Target
3a2b791a2030ff731887e9b1d87d4090N.exe
-
Size
1.2MB
-
MD5
3a2b791a2030ff731887e9b1d87d4090
-
SHA1
9a6f330f6e8861b91bcfcd970dc3020d484cd7e6
-
SHA256
8d640da972040cdef95eee8c1f6f81511b2f79e61e6f3cbaeb434d1558a46b44
-
SHA512
f8cd6e916c8fa23a038005b4988509728015cec052c0facac316d044af33311d508f43a96fe7de7f576b57d5644640dc82e508f57518413959b3f00fb4a3bd36
-
SSDEEP
24576:ZAqAIz8AFJAbmThJW3MSiXFeAoXb0qXHL/qhNJmiljAhQ8nnd/smw/tw:+p28AQqUggbzHLqhHmiljAhQ8nndpw/m
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4020 BI.exe -
Loads dropped DLL 6 IoCs
pid Process 2648 3a2b791a2030ff731887e9b1d87d4090N.exe 2648 3a2b791a2030ff731887e9b1d87d4090N.exe 4020 BI.exe 4020 BI.exe 4020 BI.exe 2648 3a2b791a2030ff731887e9b1d87d4090N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4968 2648 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a2b791a2030ff731887e9b1d87d4090N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BI.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2648 3a2b791a2030ff731887e9b1d87d4090N.exe 2648 3a2b791a2030ff731887e9b1d87d4090N.exe 2648 3a2b791a2030ff731887e9b1d87d4090N.exe 2648 3a2b791a2030ff731887e9b1d87d4090N.exe 2648 3a2b791a2030ff731887e9b1d87d4090N.exe 2648 3a2b791a2030ff731887e9b1d87d4090N.exe 2648 3a2b791a2030ff731887e9b1d87d4090N.exe 2648 3a2b791a2030ff731887e9b1d87d4090N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2648 wrote to memory of 4020 2648 3a2b791a2030ff731887e9b1d87d4090N.exe 84 PID 2648 wrote to memory of 4020 2648 3a2b791a2030ff731887e9b1d87d4090N.exe 84 PID 2648 wrote to memory of 4020 2648 3a2b791a2030ff731887e9b1d87d4090N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a2b791a2030ff731887e9b1d87d4090N.exe"C:\Users\Admin\AppData\Local\Temp\3a2b791a2030ff731887e9b1d87d4090N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\nshBE40.tmp\BI.exeC:\Users\Admin\AppData\Local\Temp\nshBE40.tmp\BI.exe { "json_send_time" : "14/8/2024 12:35:2:603" , "product_id_version" : "" , "product_type" : "" , "product_id" : "" , "offer_id" : "442" , "user_type" : "NULL" , "result" : "Success" , "user_operating_system_bits" : "" , "current_default_search" : "" , "current_homepage" : "" , "current_toolbars" : "" , "attempt_number" : "1" , "is_silent" : "" , "user_ms_dotnet_framework_ver" : "" , "user_acount_type" : "" , "user_ie_version" : "" , "user_default_browser_version" : "" , "user_default_browser" : "" , "user_service_pack" : "" , "user_operating_system" : "" , "revision_number" : "0" , "build_id" : "00000000" , "dm_version" : "1.3.7.7_HF5_SessionId_TS" , "bundle_id" : "c26ae04e-a1f8-4abf-821d-edb75a4c22ec" , "machine_user_id" : "{D4A8446F-57C3-4891-BD2D-165659B3A723}" , "channel_id" : "" , "installation_session_id" : "B8AB2DB3-5EB9-4D73-891C-F84CC60B30A2" , "publisher_internal_id" : "1" , "publisher_id" : "Brothersoft" , "publisher_account_id" : "Brothersoft" , "order" : "1.0" , "phase" : "Init" , "Is_Test" : "0" }2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 23562⤵
- Program crash
PID:4968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2648 -ip 26481⤵PID:1104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD52d949f5ca08919067c056f0a76c1c747
SHA1fd1727b91b125b3e85d061cb1a06b45edf7f8701
SHA256a4c6da1e7cb0691dba1cb6b47239ad5967a107e87221e402b853f64d798f2d94
SHA5120b9a7f580e09541f9762ac755e056ee683612dec04801dfd2b9b03897765b3ab0d10e2be4b9636316c11cb8eba1cc60d1be60eaa90bbb0b9c1ee8994e01cdc2f
-
Filesize
75KB
MD525109dc34d4cc2804714945083cad37f
SHA11676f038cb43e72985bebabd24c59d5f2117a38e
SHA256c733640ab386f03efee67ad0a04168557aac8fc4028d7000060bf0a8b4f3b481
SHA5125132b6b32f68f3ad6459ea8fffde93f7ed300fa1952a0b1beb23de0c5ee9bc0cc305dd049756c277f8488673e28c80e717211801ec845b0c0682a9255d12afb9
-
Filesize
17KB
MD594aeaac642443b43e6d3785ed545a6a9
SHA1feac08bfd96211a72c6afb4e935b655d9dd9c34f
SHA2562fc9d23ada84acf3436dbb5199e8cc0ebff8960268777c1789198025de1d9b49
SHA5120c0d8b2a85eac54c83b45542c5a87afd2c7d65c427361fef0206f304b7f9ad0e130c6976df956a6211bcdb3a66a28d61061ad2ac7296e0add63af8ae44480c16
-
Filesize
9KB
MD50c1797a7fe8c65cf36ca5bc35aad0ff7
SHA1b2754700c45211e641a59c1ddf55f47d55d43bdc
SHA25685ec98a0fc8ff6c202e0a01142814a5a5438a71636a4025a2a8506cc7b22edba
SHA51276e5eefc894f815099e8360d89253505b8f29974b71d63e0a5e0636e6db9f8793bf11e992140b89d478a856402741222ad0bf2acff72f95d13fb60b370b13231
-
Filesize
3KB
MD59b8cf1c97726c080629c98ddec68bebd
SHA15d764a5bc2e5cbb5f2569336e4c0c5f472d07f35
SHA2561b6c626d6a600be68b11133c7bcd32fbcc8015951037bb36beaa067914367715
SHA51267c590d216e73d0dd58974567dc248e0adb363c59e318efe1e715960a38220c1cfb98328cdb69941888f9e039d60980fd1fcf11084498fcb46f80c135cb60d24
-
Filesize
2KB
MD5b0daff66be205df4ad748bf6c2e8cb90
SHA1a8a0152c4283f1f8a2576280981007a68efcce1f
SHA25691daf936776000f8fbd417aafedbdb31bcc8c0d23964ecd177d1a5ee767d2e61
SHA5123f2b1bbea54d650ca4173f0037c1fd6a27707afbb7ab5200d2d72fd3b32cf3e696f27bcffe5f492d2e2134f5879a537167eee568951efffbbeb249b7eff15116
-
Filesize
29KB
MD5dccdcb124064a1d9a5eb12232348b898
SHA1f294fac154cb1c6c18fe054ac584f767594b93fb
SHA25637adc0183d94ae6ca1895643423dac0c97750d7103e6b00c14299dfc4ad2271e
SHA512bd89bcd513bb7120db80e1115b4caceaa18c4ea863fe29b232002d447c3813133ff2849fcb2d4df45e3ff67e0e0d9d340d61060b9c74045b17efa5b1c1f5b05e
-
Filesize
701KB
MD58d0bd6f2bbe8b45ed19906fee1630e60
SHA1f0d16620562ba2d1db6752198d6bb63c9d410587
SHA2561267240909fee88f9ca8a7a8bb12186b31eed056c2ee306208956f0f92454449
SHA51201300d1bece7caf265e08fa93f319004df7cfeaf24aa5c548c079f693882400f6f9c4931e4e77804006999ebaf978aea9ca6f150d76afdfd5bf7b94b9a66da6a