Analysis
-
max time kernel
46s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
24-05-2022 21:37
Static task
static1
Behavioral task
behavioral1
Sample
bc265a21f56c914f882f28f74aae8424cd516084c680817bcb9875df592f07e9.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
bc265a21f56c914f882f28f74aae8424cd516084c680817bcb9875df592f07e9.exe
Resource
win10v2004-20220414-en
General
-
Target
bc265a21f56c914f882f28f74aae8424cd516084c680817bcb9875df592f07e9.exe
-
Size
362KB
-
MD5
029495b7e61292c0b469631f78ebdd63
-
SHA1
51e4574acbb727100e7c20566495f12d7252cdc7
-
SHA256
bc265a21f56c914f882f28f74aae8424cd516084c680817bcb9875df592f07e9
-
SHA512
ae770f0848457db601a0fc1cbc97cc7080dad039bebefad3a9e845a122790903ffc82233a0449c3cb3d0fa17b37c2a1dad707305f19ea079918b9ad7876c892d
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
bc265a21f56c914f882f28f74aae8424cd516084c680817bcb9875df592f07e9.exepid process 2004 bc265a21f56c914f882f28f74aae8424cd516084c680817bcb9875df592f07e9.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
bc265a21f56c914f882f28f74aae8424cd516084c680817bcb9875df592f07e9.exedescription pid process target process PID 2004 set thread context of 1644 2004 bc265a21f56c914f882f28f74aae8424cd516084c680817bcb9875df592f07e9.exe bc265a21f56c914f882f28f74aae8424cd516084c680817bcb9875df592f07e9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
bc265a21f56c914f882f28f74aae8424cd516084c680817bcb9875df592f07e9.exepid process 2004 bc265a21f56c914f882f28f74aae8424cd516084c680817bcb9875df592f07e9.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
bc265a21f56c914f882f28f74aae8424cd516084c680817bcb9875df592f07e9.exedescription pid process target process PID 2004 wrote to memory of 1644 2004 bc265a21f56c914f882f28f74aae8424cd516084c680817bcb9875df592f07e9.exe bc265a21f56c914f882f28f74aae8424cd516084c680817bcb9875df592f07e9.exe PID 2004 wrote to memory of 1644 2004 bc265a21f56c914f882f28f74aae8424cd516084c680817bcb9875df592f07e9.exe bc265a21f56c914f882f28f74aae8424cd516084c680817bcb9875df592f07e9.exe PID 2004 wrote to memory of 1644 2004 bc265a21f56c914f882f28f74aae8424cd516084c680817bcb9875df592f07e9.exe bc265a21f56c914f882f28f74aae8424cd516084c680817bcb9875df592f07e9.exe PID 2004 wrote to memory of 1644 2004 bc265a21f56c914f882f28f74aae8424cd516084c680817bcb9875df592f07e9.exe bc265a21f56c914f882f28f74aae8424cd516084c680817bcb9875df592f07e9.exe PID 2004 wrote to memory of 1644 2004 bc265a21f56c914f882f28f74aae8424cd516084c680817bcb9875df592f07e9.exe bc265a21f56c914f882f28f74aae8424cd516084c680817bcb9875df592f07e9.exe PID 2004 wrote to memory of 1644 2004 bc265a21f56c914f882f28f74aae8424cd516084c680817bcb9875df592f07e9.exe bc265a21f56c914f882f28f74aae8424cd516084c680817bcb9875df592f07e9.exe PID 2004 wrote to memory of 1644 2004 bc265a21f56c914f882f28f74aae8424cd516084c680817bcb9875df592f07e9.exe bc265a21f56c914f882f28f74aae8424cd516084c680817bcb9875df592f07e9.exe PID 2004 wrote to memory of 1644 2004 bc265a21f56c914f882f28f74aae8424cd516084c680817bcb9875df592f07e9.exe bc265a21f56c914f882f28f74aae8424cd516084c680817bcb9875df592f07e9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc265a21f56c914f882f28f74aae8424cd516084c680817bcb9875df592f07e9.exe"C:\Users\Admin\AppData\Local\Temp\bc265a21f56c914f882f28f74aae8424cd516084c680817bcb9875df592f07e9.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\bc265a21f56c914f882f28f74aae8424cd516084c680817bcb9875df592f07e9.exe"C:\Users\Admin\AppData\Local\Temp\bc265a21f56c914f882f28f74aae8424cd516084c680817bcb9875df592f07e9.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\nsiEB2B.tmp\System.dllFilesize
11KB
MD5fbe295e5a1acfbd0a6271898f885fe6a
SHA1d6d205922e61635472efb13c2bb92c9ac6cb96da
SHA256a1390a78533c47e55cc364e97af431117126d04a7faed49390210ea3e89dd0e1
SHA5122cb596971e504eaf1ce8e3f09719ebfb3f6234cea5ca7b0d33ec7500832ff4b97ec2bbe15a1fbf7e6a5b02c59db824092b9562cd8991f4d027feab6fd3177b06
-
memory/1644-56-0x0000000000403BB6-mapping.dmp
-
memory/2004-54-0x0000000075521000-0x0000000075523000-memory.dmpFilesize
8KB