Overview
overview
10Static
static
3fa84aaca64...24.exe
windows7-x64
10fa84aaca64...24.exe
windows10-2004-x64
10$PLUGINSDI...og.dll
windows7-x64
3$PLUGINSDI...og.dll
windows10-2004-x64
30/Setup.exe
windows7-x64
30/Setup.exe
windows10-2004-x64
3039F3.dll
windows7-x64
1039F3.dll
windows10-2004-x64
1039F4.js
windows7-x64
3039F4.js
windows10-2004-x64
31/333.exe
windows7-x64
31/333.exe
windows10-2004-x64
32/babka.cmd
windows7-x64
62/babka.cmd
windows10-2004-x64
6Ionic.Zip.dll
windows7-x64
1Ionic.Zip.dll
windows10-2004-x64
1SibClr.dll
windows7-x64
3SibClr.dll
windows10-2004-x64
3Sibjs.exe
windows7-x64
3Sibjs.exe
windows10-2004-x64
3Sibuia.exe
windows7-x64
3Sibuia.exe
windows10-2004-x64
3Zip.dll
windows7-x64
1Zip.dll
windows10-2004-x64
1Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28-01-2025 13:54
Static task
static1
Behavioral task
behavioral1
Sample
fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/siblog.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/siblog.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
0/Setup.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
0/Setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
039F3.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
039F3.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
039F4.js
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
039F4.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
1/333.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
1/333.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
2/babka.cmd
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
2/babka.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Ionic.Zip.dll
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
Ionic.Zip.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
SibClr.dll
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
SibClr.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Sibjs.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Sibjs.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Sibuia.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
Sibuia.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Zip.dll
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
Zip.dll
Resource
win10v2004-20241007-en
General
-
Target
2/babka.cmd
-
Size
277B
-
MD5
7b3f261fb057fce0cb6233bd5258f829
-
SHA1
d8b9075eaea96e7c5444cd3a209c78bd8bcd4e38
-
SHA256
70fc159c1040f7da1beaba2ca98004babbd2ae7e2957d7c0c2aa67ebc43a1457
-
SHA512
06401741072a5f0e41ea37523925b04af9fb2710f559b21eaba3a449a929d86028dfa6750d67744940bdcfb838e20fcb7210239a67d9f8c6ad09f4d0ed73d2be
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\FutureApp = "C:\\ProgramData\\FutureApp\\FutureApp.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\FutureApp = "C:\\ProgramData\\FutureApp\\FutureApp.exe" reg.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2260 2200 cmd.exe 31 PID 2200 wrote to memory of 2260 2200 cmd.exe 31 PID 2200 wrote to memory of 2260 2200 cmd.exe 31 PID 2200 wrote to memory of 2892 2200 cmd.exe 32 PID 2200 wrote to memory of 2892 2200 cmd.exe 32 PID 2200 wrote to memory of 2892 2200 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2\babka.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "FutureApp" /t REG_SZ /F /D "C:\ProgramData\FutureApp\FutureApp.exe"2⤵
- Adds Run key to start application
PID:2260
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "FutureApp" /t REG_SZ /F /D "C:\ProgramData\FutureApp\FutureApp.exe"2⤵
- Adds Run key to start application
PID:2892
-