Resubmissions
20-12-2024 18:09
241220-wrh5ea1lcx 619-12-2024 22:21
241219-1923fssjhq 619-12-2024 22:19
241219-18x24ssjfl 617-12-2024 16:11
241217-tneayatnbm 1002-12-2024 04:02
241202-el979stpdr 6Analysis
-
max time kernel
84s -
max time network
76s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-12-2024 22:19
Static task
static1
Behavioral task
behavioral1
Sample
Bloxxed_v1 (1).exe
Resource
win11-20241007-en
General
-
Target
Bloxxed_v1 (1).exe
-
Size
172KB
-
MD5
66ddf5e574409a5999cc1dc528cc200a
-
SHA1
fd10666096fd8f56f7ff43fc13206a67d417c290
-
SHA256
56d9cb781bcc6ec4aa4933c98e8451d0ccbe41cfea832367dc4792fdf39603a3
-
SHA512
e4d4056e85ddb1f47ece180ea65864723c907fd233f9a2619be8f7b59291065c09d7c66160662a4be19797e2f9a9cc063895e771ddc97688c6dd366651ed66bc
-
SSDEEP
3072:GMobR7ezAjLOZvmX1i5GWp1icKAArDZz4N9GhbkrNEk1LzB:beR7eammGp0yN90QEs
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" Bloxxed_v1 (1).exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000\Software\Microsoft\Internet Explorer\TypedURLs taskmgr.exe -
Modifies registry class 35 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "287309825" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\Microsoft.Windows.ControlPanel explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings taskmgr.exe Set value (data) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 1e00718000000000000000000000e1a40ed25739d211a40b0c50205241530000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{65F125E5-7BE1-4810-BA9D-D271C8432CE3}" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f706806ee260aa0d7449371beb064c986830000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\Microsoft.Windows.ControlPanel\HotKey = "0" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 0c0001008421de39050000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\Microsoft.Windows.ControlPanel\ShowCmd = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \Registry\User\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\NotificationData explorer.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings control.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\Microsoft.Windows.ControlPanel\WFlags = "0" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders explorer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5052 explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 5052 explorer.exe 3084 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeShutdownPrivilege 5020 control.exe Token: SeCreatePagefilePrivilege 5020 control.exe Token: SeDebugPrivilege 3084 taskmgr.exe Token: SeSystemProfilePrivilege 3084 taskmgr.exe Token: SeCreateGlobalPrivilege 3084 taskmgr.exe Token: 33 3084 taskmgr.exe Token: SeIncBasePriorityPrivilege 3084 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5052 explorer.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe 3084 taskmgr.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 128 wrote to memory of 4480 128 Bloxxed_v1 (1).exe 77 PID 128 wrote to memory of 4480 128 Bloxxed_v1 (1).exe 77 PID 5052 wrote to memory of 3084 5052 explorer.exe 84 PID 5052 wrote to memory of 3084 5052 explorer.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bloxxed_v1 (1).exe"C:\Users\Admin\AppData\Local\Temp\Bloxxed_v1 (1).exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:128 -
C:\Windows\SYSTEM32\cmd.execmd /c bloxxedbyfronbypass1.93.bat2⤵PID:4480
-
-
C:\Windows\system32\control.exe"C:\Windows\system32\control.exe" /name Microsoft.AdministrativeTools1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5020
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
- System Location Discovery: System Language Discovery
PID:1248
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /72⤵
- Checks SCSI registry key(s)
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3084
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5008
-
C:\Windows\System32\warvpk.exe"C:\Windows\System32\warvpk.exe"1⤵PID:3532
-
C:\Windows\System32\warvpk.exe"C:\Windows\System32\warvpk.exe"1⤵PID:3124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5297cd6e1c46fa5c8e8a48fca13c68805
SHA1de5c7afb932262c98b555b571e66a20f5046393b
SHA256c44412a9c4e0d19828e82d92bb56d604c461712c773548452280bdbac2f3fb96
SHA5127d550c6bdb85196898201420e89419fae357d94517b5dff945cfbaab989b3e39dd6b7f6911833bc3d1ccc192b276f0b1a4d7998bb8ae37e81a4bfe9851cadc53