Overview
overview
10Static
static
10BBA Launcher.zip
windows7-x64
1BBA Launcher.zip
windows10-2004-x64
1BBA Launcher.exe
windows7-x64
7BBA Launcher.exe
windows10-2004-x64
7$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDIR/app-64.7z
windows7-x64
3$PLUGINSDIR/app-64.7z
windows10-2004-x64
3locales/vi.pak
windows7-x64
3locales/vi.pak
windows10-2004-x64
3locales/zh-CN.pak
windows7-x64
3locales/zh-CN.pak
windows10-2004-x64
3locales/zh-TW.pak
windows7-x64
3locales/zh-TW.pak
windows10-2004-x64
3resources.pak
windows7-x64
3resources.pak
windows10-2004-x64
3resources/app.asar
windows7-x64
3resources/app.asar
windows10-2004-x64
3resources/elevate.exe
windows7-x64
3resources/elevate.exe
windows10-2004-x64
3resources/...op.ini
windows7-x64
1resources/...op.ini
windows10-2004-x64
1resources/...ct.jar
windows7-x64
1resources/...ct.jar
windows10-2004-x64
snapshot_blob.bin
windows7-x64
3snapshot_blob.bin
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 03:01
Behavioral task
behavioral1
Sample
BBA Launcher.zip
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
BBA Launcher.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
BBA Launcher.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
BBA Launcher.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/app-64.7z
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/app-64.7z
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
locales/vi.pak
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
locales/vi.pak
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
locales/zh-CN.pak
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
locales/zh-CN.pak
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
locales/zh-TW.pak
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
locales/zh-TW.pak
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
resources.pak
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
resources.pak
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
resources/app.asar
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
resources/app.asar
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
resources/elevate.exe
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
resources/elevate.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
resources/libraries/Desktop.ini
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
resources/libraries/Desktop.ini
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
resources/libraries/java/PackXZExtract.jar
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
resources/libraries/java/PackXZExtract.jar
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
snapshot_blob.bin
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
snapshot_blob.bin
Resource
win10v2004-20240802-en
General
-
Target
locales/zh-CN.pak
-
Size
447KB
-
MD5
156894db535f0fbe193d66c0afb4b112
-
SHA1
e347caa3c41ea7461c217c029dbca54567fbe27c
-
SHA256
cc5a411d3bf0ddfba9e5041dfeeaed70265ba949f7b7ccba0170b88e3e14ceb0
-
SHA512
e81a0968598536e91c17a1998682cb5fff42bd3199c41b64e2d76827c96b187e8f86182843c061735dad2b7cd5e32750e473c1a5f9c82bcc0dcc30f1bdb8b806
-
SSDEEP
6144:toQrG8fptN1zkK7/56aO4ydpD659mqjNFEwYHB07ulz:jrptjzX56aO4yz65YcNFEwmB/
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\.pak rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\pak_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\pak_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\pak_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\pak_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\pak_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\.pak\ = "pak_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\pak_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2792 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2792 AcroRd32.exe 2792 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2080 2540 cmd.exe 31 PID 2540 wrote to memory of 2080 2540 cmd.exe 31 PID 2540 wrote to memory of 2080 2540 cmd.exe 31 PID 2080 wrote to memory of 2792 2080 rundll32.exe 33 PID 2080 wrote to memory of 2792 2080 rundll32.exe 33 PID 2080 wrote to memory of 2792 2080 rundll32.exe 33 PID 2080 wrote to memory of 2792 2080 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\locales\zh-CN.pak1⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\locales\zh-CN.pak2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\locales\zh-CN.pak"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2792
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5c71efe23b8f93cd8f4e5f060f6cb9d8a
SHA1214f2d5c60478aac105ee4c420273bcd6a7b53c4
SHA256e89941181981e393b0ae730eab1a4d0470be0c8b85438f44463efd535a7fc53c
SHA512aef9c9493786d7867716cdcb6e52b0f9efd9c17f5c340ed02404cf0a2a893b81b1dc49b61b3fc8499f6441ba461bee414aff58df93278551935e1b0e3940f750