Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 09:42
Static task
static1
Behavioral task
behavioral1
Sample
bnh.exe
Resource
win7-20241010-en
General
-
Target
bnh.exe
-
Size
614KB
-
MD5
c2927f706f2fc5d37767de3f40c8671b
-
SHA1
457a0cbf5058152f04bcf018534646bbce2b5646
-
SHA256
1a55fa78a001127ab3e53317fc29487b57343034496594949610a78191156519
-
SHA512
5c37cba7f9dd2bde172daa6a61a4cd2d1395cb3dd5c8016becb13a5054908b003f416a37016f188d28db8d5e4db9199a0f9983cd52ee1a393d1a23ca75415539
-
SSDEEP
12288:xMz3Zg6g2zuXCzXDUO03kdwTYDHiwngDa2mYj:xM766g2qSzzRDLnD2m
Malware Config
Extracted
xloader
2.3
n066
elsegundonewhaven.com
miiways.com
tripledstones.com
innerworkshop.vision
kirkgun.com
vivabienrealty.com
estudiopedroleon.com
joannebuyproperty.com
top3wireless.com
kureex.com
theselfieplug.com
citymobileofficial.com
latestgrants.com
atomicstream.com
campingds.com
lesphere.com
kgeorgiades.com
nicktrigili.com
whds60w.com
nutricookinternational.com
chefdoeuvre-delamere.com
gugar-nuts.com
thebiz2020.com
eeonna.com
vivinv.com
1560a.com
balconesdemercurio.com
integrityinai.com
smartknocksacademy.com
bloodyelf.com
birth.love
stoplookandcraft.com
beauty-life1.com
cbdhedge.com
jordansneakersale.com
moony.xyz
ritavestal.com
nacionintelectual.com
crystalowens.com
250iu.com
clickclickpoof.com
sportscavevr.com
veraroxy.online
fancentricity.com
musuku.digital
tokoherbalalia.com
nowaplant.com
singwheel.com
seveninvestmentsgroup.com
360propertyrenovations.com
rrtll.com
aeronedgemanagement.com
enlightenedhealthcoaching.com
cumhuriyetcidemokratparti.kim
kryddexperten.com
uron.cloud
chuyennhathanhhungtransport.com
ultimateamericanapparel.com
makeldrworks.com
blun33.com
baojumbomiennam.com
citestwn1597508395.com
jaescents.com
calvary.cloud
untangled218.com
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3284-16-0x00000000003D0000-0x00000000003F8000-memory.dmp xloader -
Executes dropped EXE 1 IoCs
Processes:
AddInProcess32.exepid process 3284 AddInProcess32.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
bnh.exedescription pid process target process PID 3320 set thread context of 3284 3320 bnh.exe AddInProcess32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4844 3284 WerFault.exe AddInProcess32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
bnh.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnh.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
bnh.exepid process 3320 bnh.exe 3320 bnh.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
bnh.exedescription pid process Token: SeDebugPrivilege 3320 bnh.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
bnh.exedescription pid process target process PID 3320 wrote to memory of 3284 3320 bnh.exe AddInProcess32.exe PID 3320 wrote to memory of 3284 3320 bnh.exe AddInProcess32.exe PID 3320 wrote to memory of 3284 3320 bnh.exe AddInProcess32.exe PID 3320 wrote to memory of 3284 3320 bnh.exe AddInProcess32.exe PID 3320 wrote to memory of 3284 3320 bnh.exe AddInProcess32.exe PID 3320 wrote to memory of 3284 3320 bnh.exe AddInProcess32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bnh.exe"C:\Users\Admin\AppData\Local\Temp\bnh.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"2⤵
- Executes dropped EXE
PID:3284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3284 -s 1883⤵
- Program crash
PID:4844
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3284 -ip 32841⤵PID:4376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD59827ff3cdf4b83f9c86354606736ca9c
SHA1e73d73f42bb2a310f03eb1bcbb22be2b8eb7c723
SHA256c1cf3dc8fa1c7fc00f88e07ad539979b3706ca8d69223cffd1d58bc8f521f63a
SHA5128261828d55f3b5134c0aeb98311c04e20c5395d4347251746f3be0fb854f36cc7e118713cd00c9867537e6e47d5e71f2b2384fc00c67f0ae1b285b8310321579