Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:03
Behavioral task
behavioral1
Sample
155绿色软件站.url
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
155绿色软件站.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
BiBiLe.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
BiBiLe.exe
Resource
win10v2004-20240802-en
General
-
Target
BiBiLe.exe
-
Size
453KB
-
MD5
0e839a2f0f767102c53a330ec378871d
-
SHA1
1fa35dc8b93e0f7fd3ece9ea69b143ac727a5cdb
-
SHA256
15192e44b8afb1f2d79148c8d174f66ef176044c5cff116905d510cd014af06c
-
SHA512
f75f16bfa69649d69f321f8aa6b1b567e889ec93eab047b6617ece159b7df33073c4bfbbf9444f410be445f4b48ea6df67c21c0f8e6b5421cc51398ee2486bd6
-
SSDEEP
12288:H/ts51lE3H5syG1/lW3PKiKQwiCGvWHkgfT+W:HEOH5oGPKawipKTv
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: BiBiLe.exe File opened (read-only) \??\A: BiBiLe.exe File opened (read-only) \??\E: BiBiLe.exe File opened (read-only) \??\K: BiBiLe.exe File opened (read-only) \??\L: BiBiLe.exe File opened (read-only) \??\O: BiBiLe.exe File opened (read-only) \??\P: BiBiLe.exe File opened (read-only) \??\R: BiBiLe.exe File opened (read-only) \??\G: BiBiLe.exe File opened (read-only) \??\N: BiBiLe.exe File opened (read-only) \??\S: BiBiLe.exe File opened (read-only) \??\W: BiBiLe.exe File opened (read-only) \??\H: BiBiLe.exe File opened (read-only) \??\M: BiBiLe.exe File opened (read-only) \??\T: BiBiLe.exe File opened (read-only) \??\V: BiBiLe.exe File opened (read-only) \??\X: BiBiLe.exe File opened (read-only) \??\Z: BiBiLe.exe File opened (read-only) \??\B: BiBiLe.exe File opened (read-only) \??\I: BiBiLe.exe File opened (read-only) \??\J: BiBiLe.exe File opened (read-only) \??\Q: BiBiLe.exe File opened (read-only) \??\Y: BiBiLe.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BiBiLe.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 2688 BiBiLe.exe Token: SeIncBasePriorityPrivilege 2688 BiBiLe.exe Token: 33 2688 BiBiLe.exe Token: SeIncBasePriorityPrivilege 2688 BiBiLe.exe Token: 33 2688 BiBiLe.exe Token: SeIncBasePriorityPrivilege 2688 BiBiLe.exe Token: 33 2688 BiBiLe.exe Token: SeIncBasePriorityPrivilege 2688 BiBiLe.exe Token: 33 2688 BiBiLe.exe Token: SeIncBasePriorityPrivilege 2688 BiBiLe.exe Token: 33 2688 BiBiLe.exe Token: SeIncBasePriorityPrivilege 2688 BiBiLe.exe Token: 33 2688 BiBiLe.exe Token: SeIncBasePriorityPrivilege 2688 BiBiLe.exe Token: 33 2688 BiBiLe.exe Token: SeIncBasePriorityPrivilege 2688 BiBiLe.exe Token: 33 2688 BiBiLe.exe Token: SeIncBasePriorityPrivilege 2688 BiBiLe.exe Token: 33 2688 BiBiLe.exe Token: SeIncBasePriorityPrivilege 2688 BiBiLe.exe Token: 33 2688 BiBiLe.exe Token: SeIncBasePriorityPrivilege 2688 BiBiLe.exe Token: 33 2688 BiBiLe.exe Token: SeIncBasePriorityPrivilege 2688 BiBiLe.exe Token: 33 2688 BiBiLe.exe Token: SeIncBasePriorityPrivilege 2688 BiBiLe.exe Token: 33 2688 BiBiLe.exe Token: SeIncBasePriorityPrivilege 2688 BiBiLe.exe Token: 33 2688 BiBiLe.exe Token: SeIncBasePriorityPrivilege 2688 BiBiLe.exe Token: 33 2688 BiBiLe.exe Token: SeIncBasePriorityPrivilege 2688 BiBiLe.exe Token: 33 2688 BiBiLe.exe Token: SeIncBasePriorityPrivilege 2688 BiBiLe.exe Token: 33 2688 BiBiLe.exe Token: SeIncBasePriorityPrivilege 2688 BiBiLe.exe Token: 33 2688 BiBiLe.exe Token: SeIncBasePriorityPrivilege 2688 BiBiLe.exe Token: 33 2688 BiBiLe.exe Token: SeIncBasePriorityPrivilege 2688 BiBiLe.exe Token: 33 2688 BiBiLe.exe Token: SeIncBasePriorityPrivilege 2688 BiBiLe.exe Token: 33 2688 BiBiLe.exe Token: SeIncBasePriorityPrivilege 2688 BiBiLe.exe Token: 33 2688 BiBiLe.exe Token: SeIncBasePriorityPrivilege 2688 BiBiLe.exe Token: 33 2688 BiBiLe.exe Token: SeIncBasePriorityPrivilege 2688 BiBiLe.exe Token: 33 2688 BiBiLe.exe Token: SeIncBasePriorityPrivilege 2688 BiBiLe.exe Token: 33 2688 BiBiLe.exe Token: SeIncBasePriorityPrivilege 2688 BiBiLe.exe Token: 33 2688 BiBiLe.exe Token: SeIncBasePriorityPrivilege 2688 BiBiLe.exe Token: 33 2688 BiBiLe.exe Token: SeIncBasePriorityPrivilege 2688 BiBiLe.exe Token: 33 2688 BiBiLe.exe Token: SeIncBasePriorityPrivilege 2688 BiBiLe.exe Token: 33 2688 BiBiLe.exe Token: SeIncBasePriorityPrivilege 2688 BiBiLe.exe Token: 33 2688 BiBiLe.exe Token: SeIncBasePriorityPrivilege 2688 BiBiLe.exe Token: 33 2688 BiBiLe.exe Token: SeIncBasePriorityPrivilege 2688 BiBiLe.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 2688 BiBiLe.exe 2688 BiBiLe.exe 2688 BiBiLe.exe 2688 BiBiLe.exe 2688 BiBiLe.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 2688 BiBiLe.exe 2688 BiBiLe.exe 2688 BiBiLe.exe 2688 BiBiLe.exe 2688 BiBiLe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\BiBiLe.exe"C:\Users\Admin\AppData\Local\Temp\BiBiLe.exe"1⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2688