Analysis
-
max time kernel
137s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 08:00
Static task
static1
Behavioral task
behavioral1
Sample
eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe
Resource
win10v2004-20220901-en
General
-
Target
eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe
-
Size
35KB
-
MD5
c5a6861990530ac6c4a85cf0d664c2ce
-
SHA1
2b76db81b76a1e12c437a0654c38c3bcc769054f
-
SHA256
eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef
-
SHA512
1471103d87346e9eea7bebb3be685ae6980fa4c2dd14a3a72d4d916d9fccffa5903e0fe66ddc3006272ce718d5a54f0272083fd561c50df91d3f00434e2e754c
-
SSDEEP
384:uTgmkYQJ89BqD+H1Apn2tz7XFLsti35MXWTIqB0A+xWbosx97MSAl3AFj8YczMsu:uGJnTt2BVsfIt2ofPEuuMMZSoAsdXBBw
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1460 BCSSync.exe 832 BCSSync.exe -
Loads dropped DLL 2 IoCs
pid Process 884 eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe 884 eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe -
Unexpected DNS network traffic destination 5 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1080 set thread context of 884 1080 eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe 28 PID 1460 set thread context of 832 1460 BCSSync.exe 30 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Fonts\8k2o44.com eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 832 BCSSync.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1080 wrote to memory of 884 1080 eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe 28 PID 1080 wrote to memory of 884 1080 eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe 28 PID 1080 wrote to memory of 884 1080 eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe 28 PID 1080 wrote to memory of 884 1080 eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe 28 PID 1080 wrote to memory of 884 1080 eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe 28 PID 1080 wrote to memory of 884 1080 eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe 28 PID 1080 wrote to memory of 884 1080 eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe 28 PID 1080 wrote to memory of 884 1080 eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe 28 PID 1080 wrote to memory of 884 1080 eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe 28 PID 884 wrote to memory of 1460 884 eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe 29 PID 884 wrote to memory of 1460 884 eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe 29 PID 884 wrote to memory of 1460 884 eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe 29 PID 884 wrote to memory of 1460 884 eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe 29 PID 1460 wrote to memory of 832 1460 BCSSync.exe 30 PID 1460 wrote to memory of 832 1460 BCSSync.exe 30 PID 1460 wrote to memory of 832 1460 BCSSync.exe 30 PID 1460 wrote to memory of 832 1460 BCSSync.exe 30 PID 1460 wrote to memory of 832 1460 BCSSync.exe 30 PID 1460 wrote to memory of 832 1460 BCSSync.exe 30 PID 1460 wrote to memory of 832 1460 BCSSync.exe 30 PID 1460 wrote to memory of 832 1460 BCSSync.exe 30 PID 1460 wrote to memory of 832 1460 BCSSync.exe 30 PID 832 wrote to memory of 1912 832 BCSSync.exe 31 PID 832 wrote to memory of 1912 832 BCSSync.exe 31 PID 832 wrote to memory of 1912 832 BCSSync.exe 31 PID 832 wrote to memory of 1912 832 BCSSync.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe"C:\Users\Admin\AppData\Local\Temp\eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe"C:\Users\Admin\AppData\Local\Temp\eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe"2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe" "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe5⤵PID:1912
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD54810f7d44e9a59ab0fb8f1bfee7f9aea
SHA1613f63f4fe665a2f7160c08710a2d43c3ada0008
SHA256246fe02a375d69e36ef1c0520ecac0727cbc2f7607649ef1450b8ca187ddc541
SHA512dc47d7ecfc4502552db53f1aed0e6c15a8614e8b4cf8c3bea1d8e14c5e289e510ce2b807da86cefb944bbb15ca7a17d28959dae0b6781886f4b41c33c52d49d9
-
Filesize
35KB
MD54810f7d44e9a59ab0fb8f1bfee7f9aea
SHA1613f63f4fe665a2f7160c08710a2d43c3ada0008
SHA256246fe02a375d69e36ef1c0520ecac0727cbc2f7607649ef1450b8ca187ddc541
SHA512dc47d7ecfc4502552db53f1aed0e6c15a8614e8b4cf8c3bea1d8e14c5e289e510ce2b807da86cefb944bbb15ca7a17d28959dae0b6781886f4b41c33c52d49d9
-
Filesize
35KB
MD54810f7d44e9a59ab0fb8f1bfee7f9aea
SHA1613f63f4fe665a2f7160c08710a2d43c3ada0008
SHA256246fe02a375d69e36ef1c0520ecac0727cbc2f7607649ef1450b8ca187ddc541
SHA512dc47d7ecfc4502552db53f1aed0e6c15a8614e8b4cf8c3bea1d8e14c5e289e510ce2b807da86cefb944bbb15ca7a17d28959dae0b6781886f4b41c33c52d49d9
-
Filesize
35KB
MD54810f7d44e9a59ab0fb8f1bfee7f9aea
SHA1613f63f4fe665a2f7160c08710a2d43c3ada0008
SHA256246fe02a375d69e36ef1c0520ecac0727cbc2f7607649ef1450b8ca187ddc541
SHA512dc47d7ecfc4502552db53f1aed0e6c15a8614e8b4cf8c3bea1d8e14c5e289e510ce2b807da86cefb944bbb15ca7a17d28959dae0b6781886f4b41c33c52d49d9
-
Filesize
35KB
MD54810f7d44e9a59ab0fb8f1bfee7f9aea
SHA1613f63f4fe665a2f7160c08710a2d43c3ada0008
SHA256246fe02a375d69e36ef1c0520ecac0727cbc2f7607649ef1450b8ca187ddc541
SHA512dc47d7ecfc4502552db53f1aed0e6c15a8614e8b4cf8c3bea1d8e14c5e289e510ce2b807da86cefb944bbb15ca7a17d28959dae0b6781886f4b41c33c52d49d9