Resubmissions

14-10-2024 21:39

241014-1hsdya1hnq 10

11-10-2024 13:56

241011-q8wh6swamf 10

Analysis

  • max time kernel
    149s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2024 13:56

General

  • Target

    Drk's ByfronFucker/Drk's ByfronFucker.exe

  • Size

    5.2MB

  • MD5

    1f029d50ec7a7f175b2fd5d08f35ae05

  • SHA1

    509317a9a5ee58700def53a99bac2c3c0bb0264a

  • SHA256

    b0ee0ae8251dd20eef46b14cf902fa74331753cb3efa8b0be5850a4345bcd5cb

  • SHA512

    8cb0460feb65e97454a88cab277efd000720db2c51a333f24bed074876079071472772270589c04878cc393b6183fa9fb3cd302408fd0601211cbbddc64b279e

  • SSDEEP

    98304:qI2SKrP1dw9dCtwsQKVIo5QRNVG3Z+/8k4yqaRXn0nUYDAro+c:qI2LGnCtwsBICqNVGE/14RaF0nBA0+c

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Drk's ByfronFucker\Drk's ByfronFucker.exe
    "C:\Users\Admin\AppData\Local\Temp\Drk's ByfronFucker\Drk's ByfronFucker.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1360
    • C:\Program Files\Java\jre-1.8\bin\javaw.exe
      "C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\Drk's ByfronFucker\Drk's ByfronFucker.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4072
      • C:\Program Files\Java\jre-1.8\bin\java.exe
        java -jar C:\Users\Admin\AppData\Local\Temp\bqumtroMzf1409793782058839657.tmp
        3⤵
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2036
        • C:\Windows\SYSTEM32\attrib.exe
          attrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1728655011437.tmp
          4⤵
          • Views/modifies file attributes
          PID:1628
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1728655011437.tmp" /f"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4156
          • C:\Windows\system32\reg.exe
            REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1728655011437.tmp" /f
            5⤵
            • Adds Run key to start application
            PID:1436
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe /c "REG DELETE HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /f"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1636
          • C:\Windows\system32\reg.exe
            REG DELETE HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /f
            5⤵
              PID:2984
          • C:\Windows\SYSTEM32\cmd.exe
            cmd /c ping localhost -n 6 > nul && del C:\Users\Admin\AppData\Local\Temp\bqumtroMzf1409793782058839657.tmp
            4⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Suspicious use of WriteProcessMemory
            PID:4544
            • C:\Windows\system32\PING.EXE
              ping localhost -n 6
              5⤵
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:4492

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

      Filesize

      46B

      MD5

      f30bd705a9caaf9f0f6d3bfd16748f28

      SHA1

      85d314b65e11965d4f1ecbab5bce37aa82b4a739

      SHA256

      51707e4b570a92bb7613058f9595e3b2cc3a65492f2b8c8ce9d34ec40fd8fd8e

      SHA512

      e9e857031006cd89434c53a2d12361c140123620624471566c7a3df3c788fa5b52e036c227c5d474d1e92b1b0bb2c6ddededfc6b1c014089e46c141655249f2c

    • C:\Users\Admin\AppData\Local\Temp\bqumtroMzf1409793782058839657.tmp

      Filesize

      710KB

      MD5

      3d5299e0b01bb2ef7bb74f2e989df828

      SHA1

      64994d1efab5196ba9e6946edc9acc0b36578054

      SHA256

      3451f4acd26bd4447638f48406b2325cf1e26e7c2dc4c7ac28cd029e0f43855b

      SHA512

      fbf14f98fc8c43a1cd8baea8693389b79cdfae5557d64d097ed19920f7328373b3d03fd1d8c6773eff1867fd975a0c23f9d77a845e3e590030faedc3c712453e

    • C:\Users\Admin\AppData\Local\Temp\imageio2062622305641313102.tmp

      Filesize

      29KB

      MD5

      761e7cac78f8deb83bd52975c3587ae3

      SHA1

      27631a377d9db140287fe5d06080fe691ad18e37

      SHA256

      10de032edea9616e125cfe8a4cda5e6304056e4e36e78e06dd80116fda569c7a

      SHA512

      d5f7e674da88264d2aa79838c728517f14db8cbc6bec51564020e4872636b5e3693e3af6c1e4d9b736a091508917a5f1104fe8ca03a35f2bfb11b964acc4cb13

    • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2437139445-1151884604-3026847218-1000\83aa4cc77f591dfc2374580bbd95f6ba_4304acb9-c3f6-452a-9860-eb4e85d38d4e

      Filesize

      45B

      MD5

      c8366ae350e7019aefc9d1e6e6a498c6

      SHA1

      5731d8a3e6568a5f2dfbbc87e3db9637df280b61

      SHA256

      11e6aca8e682c046c83b721eeb5c72c5ef03cb5936c60df6f4993511ddc61238

      SHA512

      33c980d5a638bfc791de291ebf4b6d263b384247ab27f261a54025108f2f85374b579a026e545f81395736dd40fa4696f2163ca17640dd47f1c42bc9971b18cd

    • memory/1360-0-0x0000000000400000-0x000000000044A000-memory.dmp

      Filesize

      296KB

    • memory/2036-54-0x000001C8B0300000-0x000001C8B0301000-memory.dmp

      Filesize

      4KB

    • memory/2036-102-0x000001C8B0300000-0x000001C8B0301000-memory.dmp

      Filesize

      4KB

    • memory/2036-48-0x000001C8B0300000-0x000001C8B0301000-memory.dmp

      Filesize

      4KB

    • memory/2036-105-0x000001C8B1BD0000-0x000001C8B1E40000-memory.dmp

      Filesize

      2.4MB

    • memory/2036-104-0x000001C8B1BD0000-0x000001C8B1E40000-memory.dmp

      Filesize

      2.4MB

    • memory/2036-22-0x000001C8B1BD0000-0x000001C8B1E40000-memory.dmp

      Filesize

      2.4MB

    • memory/2036-83-0x000001C8B0300000-0x000001C8B0301000-memory.dmp

      Filesize

      4KB

    • memory/2036-85-0x000001C8B0300000-0x000001C8B0301000-memory.dmp

      Filesize

      4KB

    • memory/4072-3-0x0000014EEA680000-0x0000014EEA8F0000-memory.dmp

      Filesize

      2.4MB

    • memory/4072-97-0x0000014EEA680000-0x0000014EEA8F0000-memory.dmp

      Filesize

      2.4MB

    • memory/4072-35-0x0000014EE8E40000-0x0000014EE8E41000-memory.dmp

      Filesize

      4KB

    • memory/4072-70-0x0000014EE8E40000-0x0000014EE8E41000-memory.dmp

      Filesize

      4KB

    • memory/4072-33-0x0000014EE8E40000-0x0000014EE8E41000-memory.dmp

      Filesize

      4KB

    • memory/4072-129-0x0000014EE8E40000-0x0000014EE8E41000-memory.dmp

      Filesize

      4KB