Analysis
-
max time kernel
160s -
max time network
253s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-10-2022 17:00
Static task
static1
Behavioral task
behavioral1
Sample
aef9ef4061ea57a48f20b1685bec2475ecdcb090c412ce868fd1cc44894f1d2e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aef9ef4061ea57a48f20b1685bec2475ecdcb090c412ce868fd1cc44894f1d2e.exe
Resource
win10v2004-20220812-en
General
-
Target
aef9ef4061ea57a48f20b1685bec2475ecdcb090c412ce868fd1cc44894f1d2e.exe
-
Size
37KB
-
MD5
912b029db38e6c13682fb923da759462
-
SHA1
a1f5c7fdd750fc39536308c1e54c23ab91e355eb
-
SHA256
aef9ef4061ea57a48f20b1685bec2475ecdcb090c412ce868fd1cc44894f1d2e
-
SHA512
27ccecf84deb83ca2fd397d6050cd5b6c003fe23cb2c7a0a8db296cb54f7bda6e190aaa5f96e017ab2221218e568447df34ec0670cc2d59f64849d591554a4aa
-
SSDEEP
768:jpuxbbb93pfzxWt7QYQ8IgDidhHPjAJYvHF0lwY437avXKrnr7:j0Rbb5WRQYt9ir/2wrao
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2028 BCSSync.exe 892 BCSSync.exe -
Loads dropped DLL 2 IoCs
pid Process 944 aef9ef4061ea57a48f20b1685bec2475ecdcb090c412ce868fd1cc44894f1d2e.exe 944 aef9ef4061ea57a48f20b1685bec2475ecdcb090c412ce868fd1cc44894f1d2e.exe -
Unexpected DNS network traffic destination 8 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1936 set thread context of 944 1936 aef9ef4061ea57a48f20b1685bec2475ecdcb090c412ce868fd1cc44894f1d2e.exe 28 PID 2028 set thread context of 892 2028 BCSSync.exe 30 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe aef9ef4061ea57a48f20b1685bec2475ecdcb090c412ce868fd1cc44894f1d2e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe aef9ef4061ea57a48f20b1685bec2475ecdcb090c412ce868fd1cc44894f1d2e.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Fonts\8k2o44.com aef9ef4061ea57a48f20b1685bec2475ecdcb090c412ce868fd1cc44894f1d2e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 892 BCSSync.exe 944 aef9ef4061ea57a48f20b1685bec2475ecdcb090c412ce868fd1cc44894f1d2e.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1936 wrote to memory of 944 1936 aef9ef4061ea57a48f20b1685bec2475ecdcb090c412ce868fd1cc44894f1d2e.exe 28 PID 1936 wrote to memory of 944 1936 aef9ef4061ea57a48f20b1685bec2475ecdcb090c412ce868fd1cc44894f1d2e.exe 28 PID 1936 wrote to memory of 944 1936 aef9ef4061ea57a48f20b1685bec2475ecdcb090c412ce868fd1cc44894f1d2e.exe 28 PID 1936 wrote to memory of 944 1936 aef9ef4061ea57a48f20b1685bec2475ecdcb090c412ce868fd1cc44894f1d2e.exe 28 PID 1936 wrote to memory of 944 1936 aef9ef4061ea57a48f20b1685bec2475ecdcb090c412ce868fd1cc44894f1d2e.exe 28 PID 1936 wrote to memory of 944 1936 aef9ef4061ea57a48f20b1685bec2475ecdcb090c412ce868fd1cc44894f1d2e.exe 28 PID 1936 wrote to memory of 944 1936 aef9ef4061ea57a48f20b1685bec2475ecdcb090c412ce868fd1cc44894f1d2e.exe 28 PID 1936 wrote to memory of 944 1936 aef9ef4061ea57a48f20b1685bec2475ecdcb090c412ce868fd1cc44894f1d2e.exe 28 PID 1936 wrote to memory of 944 1936 aef9ef4061ea57a48f20b1685bec2475ecdcb090c412ce868fd1cc44894f1d2e.exe 28 PID 944 wrote to memory of 2028 944 aef9ef4061ea57a48f20b1685bec2475ecdcb090c412ce868fd1cc44894f1d2e.exe 29 PID 944 wrote to memory of 2028 944 aef9ef4061ea57a48f20b1685bec2475ecdcb090c412ce868fd1cc44894f1d2e.exe 29 PID 944 wrote to memory of 2028 944 aef9ef4061ea57a48f20b1685bec2475ecdcb090c412ce868fd1cc44894f1d2e.exe 29 PID 944 wrote to memory of 2028 944 aef9ef4061ea57a48f20b1685bec2475ecdcb090c412ce868fd1cc44894f1d2e.exe 29 PID 2028 wrote to memory of 892 2028 BCSSync.exe 30 PID 2028 wrote to memory of 892 2028 BCSSync.exe 30 PID 2028 wrote to memory of 892 2028 BCSSync.exe 30 PID 2028 wrote to memory of 892 2028 BCSSync.exe 30 PID 2028 wrote to memory of 892 2028 BCSSync.exe 30 PID 2028 wrote to memory of 892 2028 BCSSync.exe 30 PID 2028 wrote to memory of 892 2028 BCSSync.exe 30 PID 2028 wrote to memory of 892 2028 BCSSync.exe 30 PID 2028 wrote to memory of 892 2028 BCSSync.exe 30 PID 892 wrote to memory of 1792 892 BCSSync.exe 31 PID 892 wrote to memory of 1792 892 BCSSync.exe 31 PID 892 wrote to memory of 1792 892 BCSSync.exe 31 PID 892 wrote to memory of 1792 892 BCSSync.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\aef9ef4061ea57a48f20b1685bec2475ecdcb090c412ce868fd1cc44894f1d2e.exe"C:\Users\Admin\AppData\Local\Temp\aef9ef4061ea57a48f20b1685bec2475ecdcb090c412ce868fd1cc44894f1d2e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\aef9ef4061ea57a48f20b1685bec2475ecdcb090c412ce868fd1cc44894f1d2e.exeC:\Users\Admin\AppData\Local\Temp\aef9ef4061ea57a48f20b1685bec2475ecdcb090c412ce868fd1cc44894f1d2e.exe2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\aef9ef4061ea57a48f20b1685bec2475ecdcb090c412ce868fd1cc44894f1d2e.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe" "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"5⤵PID:1792
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD586792c2214e2bcb660d5fdff639718f2
SHA1d724076e62f9b37fb862546f36b4c2c69f583450
SHA256a2c8396d17c255ab61977e89b0958a263cf458fca286399ee51b5d0e5ecdae89
SHA512a829ecbbb4058fa8fbc53edb6edbf76efab2b157b7251277f93e33c07da19dd999cb5001e9554969a75aa0d160b373f7735ed77ce32ae86e7429826412a1d8a0
-
Filesize
37KB
MD586792c2214e2bcb660d5fdff639718f2
SHA1d724076e62f9b37fb862546f36b4c2c69f583450
SHA256a2c8396d17c255ab61977e89b0958a263cf458fca286399ee51b5d0e5ecdae89
SHA512a829ecbbb4058fa8fbc53edb6edbf76efab2b157b7251277f93e33c07da19dd999cb5001e9554969a75aa0d160b373f7735ed77ce32ae86e7429826412a1d8a0
-
Filesize
37KB
MD586792c2214e2bcb660d5fdff639718f2
SHA1d724076e62f9b37fb862546f36b4c2c69f583450
SHA256a2c8396d17c255ab61977e89b0958a263cf458fca286399ee51b5d0e5ecdae89
SHA512a829ecbbb4058fa8fbc53edb6edbf76efab2b157b7251277f93e33c07da19dd999cb5001e9554969a75aa0d160b373f7735ed77ce32ae86e7429826412a1d8a0
-
Filesize
37KB
MD586792c2214e2bcb660d5fdff639718f2
SHA1d724076e62f9b37fb862546f36b4c2c69f583450
SHA256a2c8396d17c255ab61977e89b0958a263cf458fca286399ee51b5d0e5ecdae89
SHA512a829ecbbb4058fa8fbc53edb6edbf76efab2b157b7251277f93e33c07da19dd999cb5001e9554969a75aa0d160b373f7735ed77ce32ae86e7429826412a1d8a0
-
Filesize
37KB
MD586792c2214e2bcb660d5fdff639718f2
SHA1d724076e62f9b37fb862546f36b4c2c69f583450
SHA256a2c8396d17c255ab61977e89b0958a263cf458fca286399ee51b5d0e5ecdae89
SHA512a829ecbbb4058fa8fbc53edb6edbf76efab2b157b7251277f93e33c07da19dd999cb5001e9554969a75aa0d160b373f7735ed77ce32ae86e7429826412a1d8a0