Overview
overview
10Static
static
10Drk's Byfr...er.dll
windows7-x64
1Drk's Byfr...er.dll
windows10-2004-x64
1Drk's Byfr...ra.dll
windows7-x64
1Drk's Byfr...ra.dll
windows10-2004-x64
1Drk's Byfr...lz.dll
windows7-x64
1Drk's Byfr...lz.dll
windows10-2004-x64
1Drk's Byfr...er.exe
windows7-x64
3Drk's Byfr...er.exe
windows10-2004-x64
6Drk's Byfr...In.dll
windows7-x64
1Drk's Byfr...In.dll
windows10-2004-x64
1Drk's Byfr...er.exe
windows7-x64
7Drk's Byfr...er.exe
windows10-2004-x64
7Drk's Byfr...rs.dll
windows7-x64
1Drk's Byfr...rs.dll
windows10-2004-x64
1Drk's Byfr...ns.dll
windows7-x64
1Drk's Byfr...ns.dll
windows10-2004-x64
1Drk's Byfr...re.dll
windows7-x64
1Drk's Byfr...re.dll
windows10-2004-x64
1Drk's Byfr...ms.dll
windows7-x64
1Drk's Byfr...ms.dll
windows10-2004-x64
1Drk's Byfr...pf.dll
windows7-x64
1Drk's Byfr...pf.dll
windows10-2004-x64
1Drk's Byfr...rs.dll
windows7-x64
1Drk's Byfr...rs.dll
windows10-2004-x64
1Drk's Byfr...ce.dll
windows7-x64
1Drk's Byfr...ce.dll
windows10-2004-x64
1Drk's Byfr...x.html
windows7-x64
3Drk's Byfr...x.html
windows10-2004-x64
3Drk's Byfr...ain.js
windows7-x64
3Drk's Byfr...ain.js
windows10-2004-x64
3Drk's Byfr...tes.js
windows7-x64
3Drk's Byfr...tes.js
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 13:56
Behavioral task
behavioral1
Sample
Drk's ByfronFucker/BetterFolderBrowser.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Drk's ByfronFucker/BetterFolderBrowser.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Drk's ByfronFucker/Costura.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Drk's ByfronFucker/Costura.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Drk's ByfronFucker/Dragablz.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Drk's ByfronFucker/Dragablz.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Drk's ByfronFucker/Drk's ByfronFucker.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Drk's ByfronFucker/Drk's ByfronFucker.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Drk's ByfronFucker/Drk's ByfronFuckerIn.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
Drk's ByfronFucker/Drk's ByfronFuckerIn.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Drk's ByfronFucker/Drk's Exec Fixer.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Drk's ByfronFucker/Drk's Exec Fixer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Drk's ByfronFucker/MaterialDesignColors.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Drk's ByfronFucker/MaterialDesignColors.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Drk's ByfronFucker/MaterialDesignExtensions.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Drk's ByfronFucker/MaterialDesignExtensions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Drk's ByfronFucker/Microsoft.Web.WebView2.Core.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Drk's ByfronFucker/Microsoft.Web.WebView2.Core.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Drk's ByfronFucker/Microsoft.Web.WebView2.WinForms.dll
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
Drk's ByfronFucker/Microsoft.Web.WebView2.WinForms.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Drk's ByfronFucker/Microsoft.Web.WebView2.Wpf.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Drk's ByfronFucker/Microsoft.Web.WebView2.Wpf.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Drk's ByfronFucker/Microsoft.Xaml.Behaviors.dll
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
Drk's ByfronFucker/Microsoft.Xaml.Behaviors.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Drk's ByfronFucker/System.Diagnostics.DiagnosticSource.dll
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
Drk's ByfronFucker/System.Diagnostics.DiagnosticSource.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Drk's ByfronFucker/bin/Monaco/index.html
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Drk's ByfronFucker/bin/Monaco/index.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Drk's ByfronFucker/bin/Monaco/vs/base/worker/workerMain.js
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Drk's ByfronFucker/bin/Monaco/vs/base/worker/workerMain.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Drk's ByfronFucker/bin/Monaco/vs/basic-languages/lua/autocompletes.js
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Drk's ByfronFucker/bin/Monaco/vs/basic-languages/lua/autocompletes.js
Resource
win10v2004-20241007-en
General
-
Target
Drk's ByfronFucker/Drk's ByfronFucker.exe
-
Size
5.2MB
-
MD5
1f029d50ec7a7f175b2fd5d08f35ae05
-
SHA1
509317a9a5ee58700def53a99bac2c3c0bb0264a
-
SHA256
b0ee0ae8251dd20eef46b14cf902fa74331753cb3efa8b0be5850a4345bcd5cb
-
SHA512
8cb0460feb65e97454a88cab277efd000720db2c51a333f24bed074876079071472772270589c04878cc393b6183fa9fb3cd302408fd0601211cbbddc64b279e
-
SSDEEP
98304:qI2SKrP1dw9dCtwsQKVIo5QRNVG3Z+/8k4yqaRXn0nUYDAro+c:qI2LGnCtwsBICqNVGE/14RaF0nBA0+c
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1728655011437.tmp" reg.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Drk's ByfronFucker.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4544 cmd.exe 4492 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4492 PING.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4072 javaw.exe 4072 javaw.exe 4072 javaw.exe 4072 javaw.exe 2036 java.exe 2036 java.exe 2036 java.exe 2036 java.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1360 wrote to memory of 4072 1360 Drk's ByfronFucker.exe 85 PID 1360 wrote to memory of 4072 1360 Drk's ByfronFucker.exe 85 PID 4072 wrote to memory of 2036 4072 javaw.exe 86 PID 4072 wrote to memory of 2036 4072 javaw.exe 86 PID 2036 wrote to memory of 1628 2036 java.exe 88 PID 2036 wrote to memory of 1628 2036 java.exe 88 PID 2036 wrote to memory of 4156 2036 java.exe 90 PID 2036 wrote to memory of 4156 2036 java.exe 90 PID 4156 wrote to memory of 1436 4156 cmd.exe 92 PID 4156 wrote to memory of 1436 4156 cmd.exe 92 PID 2036 wrote to memory of 1636 2036 java.exe 93 PID 2036 wrote to memory of 1636 2036 java.exe 93 PID 1636 wrote to memory of 2984 1636 cmd.exe 95 PID 1636 wrote to memory of 2984 1636 cmd.exe 95 PID 2036 wrote to memory of 4544 2036 java.exe 96 PID 2036 wrote to memory of 4544 2036 java.exe 96 PID 4544 wrote to memory of 4492 4544 cmd.exe 98 PID 4544 wrote to memory of 4492 4544 cmd.exe 98 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1628 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Drk's ByfronFucker\Drk's ByfronFucker.exe"C:\Users\Admin\AppData\Local\Temp\Drk's ByfronFucker\Drk's ByfronFucker.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\Drk's ByfronFucker\Drk's ByfronFucker.exe"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Program Files\Java\jre-1.8\bin\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\bqumtroMzf1409793782058839657.tmp3⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1728655011437.tmp4⤵
- Views/modifies file attributes
PID:1628
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1728655011437.tmp" /f"4⤵
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1728655011437.tmp" /f5⤵
- Adds Run key to start application
PID:1436
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG DELETE HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /f"4⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\system32\reg.exeREG DELETE HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /f5⤵PID:2984
-
-
-
C:\Windows\SYSTEM32\cmd.execmd /c ping localhost -n 6 > nul && del C:\Users\Admin\AppData\Local\Temp\bqumtroMzf1409793782058839657.tmp4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\system32\PING.EXEping localhost -n 65⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4492
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5f30bd705a9caaf9f0f6d3bfd16748f28
SHA185d314b65e11965d4f1ecbab5bce37aa82b4a739
SHA25651707e4b570a92bb7613058f9595e3b2cc3a65492f2b8c8ce9d34ec40fd8fd8e
SHA512e9e857031006cd89434c53a2d12361c140123620624471566c7a3df3c788fa5b52e036c227c5d474d1e92b1b0bb2c6ddededfc6b1c014089e46c141655249f2c
-
Filesize
710KB
MD53d5299e0b01bb2ef7bb74f2e989df828
SHA164994d1efab5196ba9e6946edc9acc0b36578054
SHA2563451f4acd26bd4447638f48406b2325cf1e26e7c2dc4c7ac28cd029e0f43855b
SHA512fbf14f98fc8c43a1cd8baea8693389b79cdfae5557d64d097ed19920f7328373b3d03fd1d8c6773eff1867fd975a0c23f9d77a845e3e590030faedc3c712453e
-
Filesize
29KB
MD5761e7cac78f8deb83bd52975c3587ae3
SHA127631a377d9db140287fe5d06080fe691ad18e37
SHA25610de032edea9616e125cfe8a4cda5e6304056e4e36e78e06dd80116fda569c7a
SHA512d5f7e674da88264d2aa79838c728517f14db8cbc6bec51564020e4872636b5e3693e3af6c1e4d9b736a091508917a5f1104fe8ca03a35f2bfb11b964acc4cb13
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2437139445-1151884604-3026847218-1000\83aa4cc77f591dfc2374580bbd95f6ba_4304acb9-c3f6-452a-9860-eb4e85d38d4e
Filesize45B
MD5c8366ae350e7019aefc9d1e6e6a498c6
SHA15731d8a3e6568a5f2dfbbc87e3db9637df280b61
SHA25611e6aca8e682c046c83b721eeb5c72c5ef03cb5936c60df6f4993511ddc61238
SHA51233c980d5a638bfc791de291ebf4b6d263b384247ab27f261a54025108f2f85374b579a026e545f81395736dd40fa4696f2163ca17640dd47f1c42bc9971b18cd