Analysis
-
max time kernel
94s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 03:19
Behavioral task
behavioral1
Sample
BBA Launcher.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
BBA Launcher.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/app-64.7z
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/app-64.7z
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/app-64.7z
-
Size
81.9MB
-
MD5
f5f87e478a6f0cbf226a178a9f17efee
-
SHA1
e5cd8dfafa23bef04b42c803873e048bc76405cc
-
SHA256
b95bc9240d6e34d4421f68b0932d92b5f5186326d0a194a16b9d4d1b3acfce8f
-
SHA512
a4ae40162aa080b704f86b91f8c7b91eef46e66edad1302c9e75388a9e89a64983de980417f48be45ccbe00a35df3d05cd5b936cd75d5688b6e6f2b9067e0a58
-
SSDEEP
1572864:ye4hJceZDtbX2LKRymNEkfWx0/sX2ZNt/dZUrNVF6EG2U/o/wm:ye4BtbGGoe9+xy82LtnGzFpn/n
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4976 OpenWith.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 4976 OpenWith.exe 4976 OpenWith.exe 4976 OpenWith.exe 4976 OpenWith.exe 4976 OpenWith.exe 4976 OpenWith.exe 4976 OpenWith.exe 4976 OpenWith.exe 4976 OpenWith.exe 4976 OpenWith.exe 4976 OpenWith.exe 4976 OpenWith.exe 4976 OpenWith.exe 4976 OpenWith.exe 4976 OpenWith.exe 4976 OpenWith.exe 4976 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4976 wrote to memory of 3732 4976 OpenWith.exe 94 PID 4976 wrote to memory of 3732 4976 OpenWith.exe 94
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z1⤵
- Modifies registry class
PID:2184
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z2⤵PID:3732
-