Analysis

  • max time kernel
    147s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2024 13:48

General

  • Target

    Drk's ByfronFucker/Drk's ByfronFucker.exe

  • Size

    5.2MB

  • MD5

    1f029d50ec7a7f175b2fd5d08f35ae05

  • SHA1

    509317a9a5ee58700def53a99bac2c3c0bb0264a

  • SHA256

    b0ee0ae8251dd20eef46b14cf902fa74331753cb3efa8b0be5850a4345bcd5cb

  • SHA512

    8cb0460feb65e97454a88cab277efd000720db2c51a333f24bed074876079071472772270589c04878cc393b6183fa9fb3cd302408fd0601211cbbddc64b279e

  • SSDEEP

    98304:qI2SKrP1dw9dCtwsQKVIo5QRNVG3Z+/8k4yqaRXn0nUYDAro+c:qI2LGnCtwsBICqNVGE/14RaF0nBA0+c

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Drk's ByfronFucker\Drk's ByfronFucker.exe
    "C:\Users\Admin\AppData\Local\Temp\Drk's ByfronFucker\Drk's ByfronFucker.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3436
    • C:\Program Files\Java\jre-1.8\bin\javaw.exe
      "C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\Drk's ByfronFucker\Drk's ByfronFucker.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2944
      • C:\Program Files\Java\jre-1.8\bin\java.exe
        java -jar C:\Users\Admin\AppData\Local\Temp\bqumtroMzf7984581495965213802.tmp
        3⤵
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4148
        • C:\Windows\SYSTEM32\attrib.exe
          attrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1728654563404.tmp
          4⤵
          • Views/modifies file attributes
          PID:404
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1728654563404.tmp" /f"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4460
          • C:\Windows\system32\reg.exe
            REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1728654563404.tmp" /f
            5⤵
            • Adds Run key to start application
            PID:4632
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe /c "REG DELETE HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /f"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4368
          • C:\Windows\system32\reg.exe
            REG DELETE HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /f
            5⤵
              PID:2024
          • C:\Windows\SYSTEM32\cmd.exe
            cmd /c ping localhost -n 6 > nul && del C:\Users\Admin\AppData\Local\Temp\bqumtroMzf7984581495965213802.tmp
            4⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Suspicious use of WriteProcessMemory
            PID:464
            • C:\Windows\system32\PING.EXE
              ping localhost -n 6
              5⤵
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:4596

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

      Filesize

      46B

      MD5

      52630d3c0e75296e318794e8ff40aca0

      SHA1

      53c8d2f2dace71f96214190ef5d07403f61b2866

      SHA256

      2aceccff079fcb9775e9c930234b875e6ad019f63148a7de6530a73e6ac393ca

      SHA512

      d64385a8dc17b3b82cb5ea2dff5f592ede18b5b4bf27ff1a930832fdf15601922b850dcf6bb9c872386af767a7643bb35f739ee29eb12667707031fd7b034948

    • C:\Users\Admin\AppData\Local\Temp\bqumtroMzf7984581495965213802.tmp

      Filesize

      710KB

      MD5

      3d5299e0b01bb2ef7bb74f2e989df828

      SHA1

      64994d1efab5196ba9e6946edc9acc0b36578054

      SHA256

      3451f4acd26bd4447638f48406b2325cf1e26e7c2dc4c7ac28cd029e0f43855b

      SHA512

      fbf14f98fc8c43a1cd8baea8693389b79cdfae5557d64d097ed19920f7328373b3d03fd1d8c6773eff1867fd975a0c23f9d77a845e3e590030faedc3c712453e

    • C:\Users\Admin\AppData\Local\Temp\imageio8583533312547544950.tmp

      Filesize

      27KB

      MD5

      775969079c5e77fcec47b02034fe7010

      SHA1

      bdf3d7843befe1fe1df0da07d0718b470a4bfdf3

      SHA256

      5401da8c74225d71d5f0dcde1cc8f9bf535148465b28304ddcfc6fc092a8243a

      SHA512

      51694cb03ae3826779c79c2b93b9f7415b5e9604a6f68a3c2895c80a851546b5ded3d49853c71833e3c885fd7cbf1b47fdd688f1b7d22e043c110289e8416b83

    • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3756129449-3121373848-4276368241-1000\83aa4cc77f591dfc2374580bbd95f6ba_a63d6fdc-08cb-4232-ab51-76cafdcb4d96

      Filesize

      45B

      MD5

      c8366ae350e7019aefc9d1e6e6a498c6

      SHA1

      5731d8a3e6568a5f2dfbbc87e3db9637df280b61

      SHA256

      11e6aca8e682c046c83b721eeb5c72c5ef03cb5936c60df6f4993511ddc61238

      SHA512

      33c980d5a638bfc791de291ebf4b6d263b384247ab27f261a54025108f2f85374b579a026e545f81395736dd40fa4696f2163ca17640dd47f1c42bc9971b18cd

    • memory/2944-3-0x000001AECC520000-0x000001AECC790000-memory.dmp

      Filesize

      2.4MB

    • memory/2944-192-0x000001AECC500000-0x000001AECC501000-memory.dmp

      Filesize

      4KB

    • memory/2944-37-0x000001AECC500000-0x000001AECC501000-memory.dmp

      Filesize

      4KB

    • memory/2944-102-0x000001AECC520000-0x000001AECC790000-memory.dmp

      Filesize

      2.4MB

    • memory/2944-66-0x000001AECC500000-0x000001AECC501000-memory.dmp

      Filesize

      4KB

    • memory/3436-0-0x0000000000400000-0x000000000044A000-memory.dmp

      Filesize

      296KB

    • memory/4148-96-0x0000014FF3450000-0x0000014FF3451000-memory.dmp

      Filesize

      4KB

    • memory/4148-105-0x0000014FF3450000-0x0000014FF3451000-memory.dmp

      Filesize

      4KB

    • memory/4148-91-0x0000014FF3450000-0x0000014FF3451000-memory.dmp

      Filesize

      4KB

    • memory/4148-81-0x0000014FF3450000-0x0000014FF3451000-memory.dmp

      Filesize

      4KB

    • memory/4148-53-0x0000014FF3450000-0x0000014FF3451000-memory.dmp

      Filesize

      4KB

    • memory/4148-101-0x0000014FF3450000-0x0000014FF3451000-memory.dmp

      Filesize

      4KB

    • memory/4148-39-0x0000014FF3450000-0x0000014FF3451000-memory.dmp

      Filesize

      4KB

    • memory/4148-103-0x0000014F80000000-0x0000014F80270000-memory.dmp

      Filesize

      2.4MB

    • memory/4148-104-0x0000014FF3450000-0x0000014FF3451000-memory.dmp

      Filesize

      4KB

    • memory/4148-89-0x0000014FF3450000-0x0000014FF3451000-memory.dmp

      Filesize

      4KB

    • memory/4148-106-0x0000014FF3450000-0x0000014FF3451000-memory.dmp

      Filesize

      4KB

    • memory/4148-137-0x0000014FF3450000-0x0000014FF3451000-memory.dmp

      Filesize

      4KB

    • memory/4148-142-0x0000014FF3450000-0x0000014FF3451000-memory.dmp

      Filesize

      4KB

    • memory/4148-147-0x0000014FF3450000-0x0000014FF3451000-memory.dmp

      Filesize

      4KB

    • memory/4148-149-0x0000014FF3450000-0x0000014FF3451000-memory.dmp

      Filesize

      4KB

    • memory/4148-151-0x0000014FF3450000-0x0000014FF3451000-memory.dmp

      Filesize

      4KB

    • memory/4148-162-0x0000014FF3450000-0x0000014FF3451000-memory.dmp

      Filesize

      4KB

    • memory/4148-164-0x0000014F80000000-0x0000014F80270000-memory.dmp

      Filesize

      2.4MB

    • memory/4148-22-0x0000014F80000000-0x0000014F80270000-memory.dmp

      Filesize

      2.4MB