Overview
overview
10Static
static
10BBA Launcher.zip
windows7-x64
1BBA Launcher.zip
windows10-2004-x64
1BBA Launcher.exe
windows7-x64
7BBA Launcher.exe
windows10-2004-x64
7$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDIR/app-64.7z
windows7-x64
3$PLUGINSDIR/app-64.7z
windows10-2004-x64
3locales/vi.pak
windows7-x64
3locales/vi.pak
windows10-2004-x64
3locales/zh-CN.pak
windows7-x64
3locales/zh-CN.pak
windows10-2004-x64
3locales/zh-TW.pak
windows7-x64
3locales/zh-TW.pak
windows10-2004-x64
3resources.pak
windows7-x64
3resources.pak
windows10-2004-x64
3resources/app.asar
windows7-x64
3resources/app.asar
windows10-2004-x64
3resources/elevate.exe
windows7-x64
3resources/elevate.exe
windows10-2004-x64
3resources/...op.ini
windows7-x64
1resources/...op.ini
windows10-2004-x64
1resources/...ct.jar
windows7-x64
1resources/...ct.jar
windows10-2004-x64
snapshot_blob.bin
windows7-x64
3snapshot_blob.bin
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 03:01
Behavioral task
behavioral1
Sample
BBA Launcher.zip
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
BBA Launcher.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
BBA Launcher.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
BBA Launcher.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/app-64.7z
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/app-64.7z
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
locales/vi.pak
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
locales/vi.pak
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
locales/zh-CN.pak
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
locales/zh-CN.pak
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
locales/zh-TW.pak
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
locales/zh-TW.pak
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
resources.pak
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
resources.pak
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
resources/app.asar
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
resources/app.asar
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
resources/elevate.exe
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
resources/elevate.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
resources/libraries/Desktop.ini
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
resources/libraries/Desktop.ini
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
resources/libraries/java/PackXZExtract.jar
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
resources/libraries/java/PackXZExtract.jar
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
snapshot_blob.bin
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
snapshot_blob.bin
Resource
win10v2004-20240802-en
General
-
Target
snapshot_blob.bin
-
Size
298KB
-
MD5
cadef56f5fb216b1fbf7ada1f894ea6d
-
SHA1
373d2a4266be5c8fbf61d4363ec47ddeb2d79253
-
SHA256
0976145cc8c02f3e64ddbf51dc983bdbb456be7fcf3ce54608e218981671ac12
-
SHA512
9c90e8943f9ef6d644fe0fbe55ab25ed371739d17da8cf973893a2e41ebfa0a92bcf1761e72da032f9f3d1c6f1080c62f856aa07a3cbb609c9e8c186f92216b6
-
SSDEEP
6144:vgds9oCMz0nMGo/sPT5UcQD6QynHQx9x+zi8W8icW0K8w+E2XxkBOoT8MfFNdpO1:vgF+LUYTWf8
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\.bin rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\.bin\ = "bin_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\bin_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\bin_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\bin_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\bin_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\bin_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\bin_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2392 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2392 AcroRd32.exe 2392 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2060 2124 cmd.exe 31 PID 2124 wrote to memory of 2060 2124 cmd.exe 31 PID 2124 wrote to memory of 2060 2124 cmd.exe 31 PID 2060 wrote to memory of 2392 2060 rundll32.exe 32 PID 2060 wrote to memory of 2392 2060 rundll32.exe 32 PID 2060 wrote to memory of 2392 2060 rundll32.exe 32 PID 2060 wrote to memory of 2392 2060 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\snapshot_blob.bin1⤵
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\snapshot_blob.bin2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\snapshot_blob.bin"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2392
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53605dd26b7186fcd37683cb068bbfa90
SHA1b8afd8bbb31a16d6d5cb17399aa72d710a51d0ce
SHA2565ed5925f3f74d6d7e3868a409cfca99394b8195e5cf472de11b81a3fce8d20df
SHA51200c6951c1e5b2cb5d2eaa556a8e9b887d2cbd68365417b975b633907686ed0d7d19c9da7830824e2484bb0aa1186a04ea858a13e99ba04f6f2994372c4495962