Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 00:23
Behavioral task
behavioral1
Sample
bcaccfbd94b180cc845143c68d8bfa21be3fd27e3aeaf8fe878afe4c9fc8f7d1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bcaccfbd94b180cc845143c68d8bfa21be3fd27e3aeaf8fe878afe4c9fc8f7d1.exe
Resource
win10v2004-20220812-en
General
-
Target
bcaccfbd94b180cc845143c68d8bfa21be3fd27e3aeaf8fe878afe4c9fc8f7d1.exe
-
Size
153KB
-
MD5
7194d47f4cf25e271e612c72b853fdae
-
SHA1
2cfca79920a0eeec15d82fa7ee388b7fd1118445
-
SHA256
bcaccfbd94b180cc845143c68d8bfa21be3fd27e3aeaf8fe878afe4c9fc8f7d1
-
SHA512
7816ec5b1c6eace5f873b0973c3900e08f37728529908a4819b8a808d5c23c0d1cc331dd81cf69c2e94f79a65126cc29f643509f01df4f894809c99cd3ba47a6
-
SSDEEP
3072:aOLwcnfj/z/xWikNEs38bgNzkaJOjRNus72tTxYeO2a+VH9PQI0s/zWUWe7kUWCO:aOLwcnfrzahNrxLyG5QI0s/zrWQkUWc6
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1956-55-0x0000000001000000-0x000000000104F000-memory.dmp upx behavioral1/memory/1956-57-0x0000000001000000-0x000000000104F000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\svchost.exe bcaccfbd94b180cc845143c68d8bfa21be3fd27e3aeaf8fe878afe4c9fc8f7d1.exe File created \??\c:\windows\SysWOW64\svchost.vir bcaccfbd94b180cc845143c68d8bfa21be3fd27e3aeaf8fe878afe4c9fc8f7d1.exe File opened for modification \??\c:\windows\SysWOW64\alg.exe bcaccfbd94b180cc845143c68d8bfa21be3fd27e3aeaf8fe878afe4c9fc8f7d1.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\microsoft.net\framework64\v4.0.30319\aspnet_state.exe bcaccfbd94b180cc845143c68d8bfa21be3fd27e3aeaf8fe878afe4c9fc8f7d1.exe File opened for modification \??\c:\windows\microsoft.net\framework\v2.0.50727\mscorsvw.exe bcaccfbd94b180cc845143c68d8bfa21be3fd27e3aeaf8fe878afe4c9fc8f7d1.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v2.0.50727\mscorsvw.exe bcaccfbd94b180cc845143c68d8bfa21be3fd27e3aeaf8fe878afe4c9fc8f7d1.exe File opened for modification \??\c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe bcaccfbd94b180cc845143c68d8bfa21be3fd27e3aeaf8fe878afe4c9fc8f7d1.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v4.0.30319\mscorsvw.exe bcaccfbd94b180cc845143c68d8bfa21be3fd27e3aeaf8fe878afe4c9fc8f7d1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\text/x-vcard bcaccfbd94b180cc845143c68d8bfa21be3fd27e3aeaf8fe878afe4c9fc8f7d1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wab bcaccfbd94b180cc845143c68d8bfa21be3fd27e3aeaf8fe878afe4c9fc8f7d1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vcf bcaccfbd94b180cc845143c68d8bfa21be3fd27e3aeaf8fe878afe4c9fc8f7d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vcf\Content Type = "text/x-vcard" bcaccfbd94b180cc845143c68d8bfa21be3fd27e3aeaf8fe878afe4c9fc8f7d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\vcard_wab_auto_file\shell\open\command\ = "\"C:\\Program Files (x86)\\Windows Mail\\wab.exe\" /vcard %1" bcaccfbd94b180cc845143c68d8bfa21be3fd27e3aeaf8fe878afe4c9fc8f7d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\vcard_wab_auto_file\DefaultIcon\ = "\"C:\\Program Files (x86)\\Windows Mail\\wab.exe\",1" bcaccfbd94b180cc845143c68d8bfa21be3fd27e3aeaf8fe878afe4c9fc8f7d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\text/x-vcard\Extension = ".vcf" bcaccfbd94b180cc845143c68d8bfa21be3fd27e3aeaf8fe878afe4c9fc8f7d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vcf\ = "vcard_wab_auto_file" bcaccfbd94b180cc845143c68d8bfa21be3fd27e3aeaf8fe878afe4c9fc8f7d1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\vcard_wab_auto_file bcaccfbd94b180cc845143c68d8bfa21be3fd27e3aeaf8fe878afe4c9fc8f7d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\vcard_wab_auto_file\ = "vCard File" bcaccfbd94b180cc845143c68d8bfa21be3fd27e3aeaf8fe878afe4c9fc8f7d1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\vcard_wab_auto_file\shell\open\command bcaccfbd94b180cc845143c68d8bfa21be3fd27e3aeaf8fe878afe4c9fc8f7d1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\vcard_wab_auto_file\DefaultIcon bcaccfbd94b180cc845143c68d8bfa21be3fd27e3aeaf8fe878afe4c9fc8f7d1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1956 bcaccfbd94b180cc845143c68d8bfa21be3fd27e3aeaf8fe878afe4c9fc8f7d1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcaccfbd94b180cc845143c68d8bfa21be3fd27e3aeaf8fe878afe4c9fc8f7d1.exe"C:\Users\Admin\AppData\Local\Temp\bcaccfbd94b180cc845143c68d8bfa21be3fd27e3aeaf8fe878afe4c9fc8f7d1.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1956