Overview
overview
6Static
static
3CJ_ZJJJS_B...32.dll
windows7-x64
6CJ_ZJJJS_B...32.dll
windows10-2004-x64
6CJ_ZJJJS_B...le.exe
windows7-x64
6CJ_ZJJJS_B...le.exe
windows10-2004-x64
6CJ_ZJJJS_B...QL.dll
windows7-x64
3CJ_ZJJJS_B...QL.dll
windows10-2004-x64
3CJ_ZJJJS_B...AS.dll
windows7-x64
3CJ_ZJJJS_B...AS.dll
windows10-2004-x64
3CJ_ZJJJS_B...nu.exe
windows7-x64
3CJ_ZJJJS_B...nu.exe
windows10-2004-x64
3CJ_ZJJJS_B...n.html
windows7-x64
3CJ_ZJJJS_B...n.html
windows10-2004-x64
1CJ_ZJJJS_B...t.html
windows7-x64
3CJ_ZJJJS_B...t.html
windows10-2004-x64
3CJ_ZJJJS_B...o.html
windows7-x64
3CJ_ZJJJS_B...o.html
windows10-2004-x64
3CJ_ZJJJS_B...t.html
windows7-x64
3CJ_ZJJJS_B...t.html
windows10-2004-x64
3CJ_ZJJJS_B...es.exe
windows7-x64
3CJ_ZJJJS_B...es.exe
windows10-2004-x64
3CJ_ZJJJS_B...g.html
windows7-x64
3CJ_ZJJJS_B...g.html
windows10-2004-x64
1CJ_ZJJJS_B...lp.chm
windows7-x64
1CJ_ZJJJS_B...lp.chm
windows10-2004-x64
1Analysis
-
max time kernel
141s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 17:11
Static task
static1
Behavioral task
behavioral1
Sample
CJ_ZJJJS_BX2.1/DiskID32.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
CJ_ZJJJS_BX2.1/DiskID32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
CJ_ZJJJS_BX2.1/ExamBible.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
CJ_ZJJJS_BX2.1/ExamBible.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
CJ_ZJJJS_BX2.1/KSBAOSQL.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
CJ_ZJJJS_BX2.1/KSBAOSQL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
CJ_ZJJJS_BX2.1/MIDAS.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
CJ_ZJJJS_BX2.1/MIDAS.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
CJ_ZJJJS_BX2.1/Menu/Menu.exe
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
CJ_ZJJJS_BX2.1/Menu/Menu.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
CJ_ZJJJS_BX2.1/Menu/Model/Main.html
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
CJ_ZJJJS_BX2.1/Menu/Model/Main.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
CJ_ZJJJS_BX2.1/Menu/Model/Test.html
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
CJ_ZJJJS_BX2.1/Menu/Model/Test.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
CJ_ZJJJS_BX2.1/Menu/Model/TestInfo.html
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
CJ_ZJJJS_BX2.1/Menu/Model/TestInfo.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
CJ_ZJJJS_BX2.1/Menu/Model/TestResult.html
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
CJ_ZJJJS_BX2.1/Menu/Model/TestResult.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
CJ_ZJJJS_BX2.1/Menu/TestImages.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
CJ_ZJJJS_BX2.1/Menu/TestImages.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
CJ_ZJJJS_BX2.1/Menu/Test_UserSetting.html
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
CJ_ZJJJS_BX2.1/Menu/Test_UserSetting.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
CJ_ZJJJS_BX2.1/help.chm
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
CJ_ZJJJS_BX2.1/help.chm
Resource
win10v2004-20240802-en
General
-
Target
CJ_ZJJJS_BX2.1/ExamBible.exe
-
Size
1.4MB
-
MD5
f2514dca923340fc8d7684ec842d3fba
-
SHA1
0f6e27e37b7abb92947b4174332f8de635a3ab12
-
SHA256
238b1a66ed9966cf4a3d4af0f81d7daac7e98bc14836a4dad218e1a41d0ed276
-
SHA512
81d7e7d56f958e8c9898c8e64124009c07dc8747a05adfd467415cdf0387aaf20b0c8024f3dd90ab78b437d0b0f2e4fc59ed95dfbb874aae59c7ead9f45cb254
-
SSDEEP
24576:b1NVNQDGHmSupJURxLJsZ+Vh/sfZ05efWvG2uH3dIO+FoxY9h:pX6GzupJURxLJsS/mZ05gx2uHSO+FoK
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 ExamBible.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ExamBible.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" ExamBible.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main ExamBible.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch ExamBible.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1AEFCC20-7A24-11D2-98B0-C69BEB4B5B6D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ExamBible.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1AEFCC20-7A24-11D2-98B0-C69BEB4B5B6D}\TypeLib ExamBible.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1AEFCC20-7A24-11D2-98B0-C69BEB4B5B6D}\ = "IAppServer" ExamBible.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Borland.Midas_DatapacketRead.1 ExamBible.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E8D2FA7-591C-11D0-BF52-0020AF32BD64}\InProcServer32 ExamBible.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83F57D68-CA9A-11D2-9088-00C04FA35CFA}\1.0\ = "Borland Midas type library" ExamBible.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83F57D68-CA9A-11D2-9088-00C04FA35CFA}\1.0\0 ExamBible.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83F57D68-CA9A-11D2-9088-00C04FA35CFA}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\CJ_ZJJJS_BX2.1" ExamBible.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E8D2FA5-591C-11D0-BF52-0020AF32BD64}\ProgID ExamBible.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E8D2FA5-591C-11D0-BF52-0020AF32BD64}\ProgID\ = "Borland.Midas_DatapacketWrite.1" ExamBible.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83F57D68-CA9A-11D2-9088-00C04FA35CFA}\1.0 ExamBible.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E8D2FA1-591C-11D0-BF52-0020AF32BD64}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\CJ_ZJJJS_BX2.1\\MIDAS.DLL" ExamBible.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E8D2FA3-591C-11D0-BF52-0020AF32BD64} ExamBible.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Borland.Midas_DSCursor ExamBible.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E8D2FA3-591C-11D0-BF52-0020AF32BD64}\ProgID\ = "Borland.Midas_DSCursor.1" ExamBible.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Borland.Midas_DatapacketRead.1\Clsid ExamBible.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Borland.Midas_DatapacketWrite.1\Clsid ExamBible.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E8D2FA5-591C-11D0-BF52-0020AF32BD64}\InProcServer32\ThreadingModel = "Apartment" ExamBible.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1AEFCC20-7A24-11D2-98B0-C69BEB4B5B6D} ExamBible.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E8D2FA1-591C-11D0-BF52-0020AF32BD64}\ProgID\ = "Borland.Midas_DSBase.1" ExamBible.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E8D2FA1-591C-11D0-BF52-0020AF32BD64}\InProcServer32\ThreadingModel = "Apartment" ExamBible.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E8D2FA3-591C-11D0-BF52-0020AF32BD64}\InProcServer32\ThreadingModel = "Apartment" ExamBible.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83F57D68-CA9A-11D2-9088-00C04FA35CFA}\1.0\0\win32 ExamBible.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83F57D68-CA9A-11D2-9088-00C04FA35CFA}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\CJ_ZJJJS_BX2.1\\MIDAS.DLL" ExamBible.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1AEFCC20-7A24-11D2-98B0-C69BEB4B5B6D} ExamBible.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E8D2FA1-591C-11D0-BF52-0020AF32BD64}\VersionIndependentProgID\ = "Borland.Midas_DSBase" ExamBible.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Borland.Midas_DSCursor\ = "Borland Midas DSCursor Current" ExamBible.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Borland.Midas_DSCursor.1 ExamBible.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E8D2FA3-591C-11D0-BF52-0020AF32BD64}\VersionIndependentProgID ExamBible.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Borland.Midas_DatapacketRead.1\ = "Borland Midas DatapacketRead" ExamBible.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83F57D68-CA9A-11D2-9088-00C04FA35CFA}\1.0\FLAGS ExamBible.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83F57D68-CA9A-11D2-9088-00C04FA35CFA}\1.0\FLAGS\ = "0" ExamBible.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1AEFCC20-7A24-11D2-98B0-C69BEB4B5B6D}\ProxyStubClsid32 ExamBible.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E8D2FA7-591C-11D0-BF52-0020AF32BD64}\InProcServer32\ThreadingModel = "Apartment" ExamBible.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E8D2FA3-591C-11D0-BF52-0020AF32BD64}\VersionIndependentProgID\ = "Borland.Midas_DSCursor" ExamBible.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E8D2FA7-591C-11D0-BF52-0020AF32BD64}\ = "Borland Midas DatapacketRead" ExamBible.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1AEFCC20-7A24-11D2-98B0-C69BEB4B5B6D}\TypeLib\Version = "1.0" ExamBible.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Borland.Midas_DSBase ExamBible.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E8D2FA3-591C-11D0-BF52-0020AF32BD64}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\CJ_ZJJJS_BX2.1\\MIDAS.DLL" ExamBible.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Borland.Midas_DatapacketWrite.1\Clsid\ = "{9E8D2FA5-591C-11D0-BF52-0020AF32BD64}" ExamBible.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Borland.Midas_DSBase\CurVer ExamBible.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E8D2FA1-591C-11D0-BF52-0020AF32BD64} ExamBible.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E8D2FA7-591C-11D0-BF52-0020AF32BD64}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\CJ_ZJJJS_BX2.1\\MIDAS.DLL" ExamBible.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Borland.Midas_DSBase\Clsid ExamBible.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Borland.Midas_DSBase.1 ExamBible.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Borland.Midas_DSBase.1\ = "Borland Midas DSBase 1" ExamBible.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Borland.Midas_DSCursor\Clsid ExamBible.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Borland.Midas_DSCursor\CurVer\ = "Borland.Midas_DSCursor.1" ExamBible.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Borland.Midas_DSCursor.1\Clsid\ = "{9E8D2FA3-591C-11D0-BF52-0020AF32BD64}" ExamBible.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83F57D68-CA9A-11D2-9088-00C04FA35CFA}\1.0\HELPDIR ExamBible.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Borland.Midas_DSBase\ = "Borland Midas DSBase Current" ExamBible.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Borland.Midas_DSBase\Clsid\ = "{9E8D2FA1-591C-11D0-BF52-0020AF32BD64}" ExamBible.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E8D2FA3-591C-11D0-BF52-0020AF32BD64}\InProcServer32 ExamBible.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Borland.Midas_DatapacketWrite.1 ExamBible.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E8D2FA5-591C-11D0-BF52-0020AF32BD64} ExamBible.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83F57D68-CA9A-11D2-9088-00C04FA35CFA} ExamBible.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Borland.Midas_DSCursor\Clsid\ = "{9E8D2FA3-591C-11D0-BF52-0020AF32BD64}" ExamBible.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E8D2FA3-591C-11D0-BF52-0020AF32BD64}\ProgID ExamBible.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Borland.Midas_DSBase\CurVer\ = "Borland.Midas_DSBase.1" ExamBible.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Borland.Midas_DSCursor.1\Clsid ExamBible.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E8D2FA3-591C-11D0-BF52-0020AF32BD64}\ = "Borland Midas DSCursor 1" ExamBible.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1AEFCC20-7A24-11D2-98B0-C69BEB4B5B6D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ExamBible.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E8D2FA7-591C-11D0-BF52-0020AF32BD64}\ProgID\ = "Borland.Midas_DatapacketRead.1" ExamBible.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E8D2FA5-591C-11D0-BF52-0020AF32BD64}\ = "Borland Midas DatapacketWrite" ExamBible.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2692 ExamBible.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 2692 ExamBible.exe 2692 ExamBible.exe 2692 ExamBible.exe 2692 ExamBible.exe 2692 ExamBible.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2692 ExamBible.exe 2692 ExamBible.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\CJ_ZJJJS_BX2.1\ExamBible.exe"C:\Users\Admin\AppData\Local\Temp\CJ_ZJJJS_BX2.1\ExamBible.exe"1⤵
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
246KB
MD5fe8ff213cc13ae469ce718658ddf08a3
SHA17d71c0c527f596771c86d36d5ab571023e8b8e88
SHA256c65a9747c08845f57cd1dbb5c580f4ede368b92f3b31ea95d2476716179bcde8
SHA512d68050edbfc1d269f6156d364a827fb3ecdc5dffd77a852cc72546709c1e54b5d616a3639afd3340329ac7ba61d0983435a76c95e02f87dc4d61f2a1e881d5bb