Analysis
-
max time kernel
143s -
max time network
189s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 21:00
Static task
static1
Behavioral task
behavioral1
Sample
17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exe
Resource
win10v2004-20221111-en
General
-
Target
17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exe
-
Size
39KB
-
MD5
4b8a6dc8994b8669b127da15590e4938
-
SHA1
170fd232e386caa2a0c768118c192c58a446e28e
-
SHA256
17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed
-
SHA512
5234922dbcd78d892e5f611973f80cc84aa0a3b9ca446e13897038510ae317714120a9c308db33acb44b1036cc8e9a362398f8d16957f993b56a781b5e32d698
-
SSDEEP
768:30hvZ7K2gJSRzmKxBqg+9ZPba3QagR9DZGYVW6YXcTLNNl:kHSEHBq95XagR9lGYV/T
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
BCSSync.exeBCSSync.exepid process 1964 BCSSync.exe 1060 BCSSync.exe -
Loads dropped DLL 2 IoCs
Processes:
17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exepid process 1452 17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exe 1452 17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exe -
Unexpected DNS network traffic destination 4 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 -
Suspicious use of SetThreadContext 2 IoCs
Processes:
17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exeBCSSync.exedescription pid process target process PID 828 set thread context of 1452 828 17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exe 17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exe PID 1964 set thread context of 1060 1964 BCSSync.exe BCSSync.exe -
Drops file in Program Files directory 2 IoCs
Processes:
17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exedescription ioc process File created C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe 17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe 17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exe -
Drops file in Windows directory 1 IoCs
Processes:
17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exedescription ioc process File created C:\Windows\Fonts\GN12eyuA.com 17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
BCSSync.exepid process 1060 BCSSync.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exe17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exeBCSSync.exeBCSSync.exedescription pid process target process PID 828 wrote to memory of 1452 828 17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exe 17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exe PID 828 wrote to memory of 1452 828 17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exe 17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exe PID 828 wrote to memory of 1452 828 17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exe 17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exe PID 828 wrote to memory of 1452 828 17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exe 17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exe PID 828 wrote to memory of 1452 828 17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exe 17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exe PID 828 wrote to memory of 1452 828 17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exe 17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exe PID 828 wrote to memory of 1452 828 17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exe 17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exe PID 828 wrote to memory of 1452 828 17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exe 17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exe PID 828 wrote to memory of 1452 828 17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exe 17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exe PID 1452 wrote to memory of 1964 1452 17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exe BCSSync.exe PID 1452 wrote to memory of 1964 1452 17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exe BCSSync.exe PID 1452 wrote to memory of 1964 1452 17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exe BCSSync.exe PID 1452 wrote to memory of 1964 1452 17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exe BCSSync.exe PID 1964 wrote to memory of 1060 1964 BCSSync.exe BCSSync.exe PID 1964 wrote to memory of 1060 1964 BCSSync.exe BCSSync.exe PID 1964 wrote to memory of 1060 1964 BCSSync.exe BCSSync.exe PID 1964 wrote to memory of 1060 1964 BCSSync.exe BCSSync.exe PID 1964 wrote to memory of 1060 1964 BCSSync.exe BCSSync.exe PID 1964 wrote to memory of 1060 1964 BCSSync.exe BCSSync.exe PID 1964 wrote to memory of 1060 1964 BCSSync.exe BCSSync.exe PID 1964 wrote to memory of 1060 1964 BCSSync.exe BCSSync.exe PID 1964 wrote to memory of 1060 1964 BCSSync.exe BCSSync.exe PID 1060 wrote to memory of 560 1060 BCSSync.exe BCSSync .exe PID 1060 wrote to memory of 560 1060 BCSSync.exe BCSSync .exe PID 1060 wrote to memory of 560 1060 BCSSync.exe BCSSync .exe PID 1060 wrote to memory of 560 1060 BCSSync.exe BCSSync .exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exe"C:\Users\Admin\AppData\Local\Temp\17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\AppData\Local\Temp\17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exeC:\Users\Admin\AppData\Local\Temp\17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exe2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe" "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"5⤵PID:560
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD50772e8a99351575fb8c8799fea5813bc
SHA18b6d008492ee6a1cd217bc7465f2ecec0e97f558
SHA256179b7e3db0960ba8fcde1d8ec35bcb29956c0a13a7e89c29be6cbd8a445310d2
SHA5125313da84d9eea08fb602bd9491541f4a74cd5db85d304b81d60f36d6212f54b2d5b03bedeb4bd8d844cb1c897ed0531ac39022ba6846230febec0fa0152a3b13
-
Filesize
39KB
MD50772e8a99351575fb8c8799fea5813bc
SHA18b6d008492ee6a1cd217bc7465f2ecec0e97f558
SHA256179b7e3db0960ba8fcde1d8ec35bcb29956c0a13a7e89c29be6cbd8a445310d2
SHA5125313da84d9eea08fb602bd9491541f4a74cd5db85d304b81d60f36d6212f54b2d5b03bedeb4bd8d844cb1c897ed0531ac39022ba6846230febec0fa0152a3b13
-
Filesize
39KB
MD50772e8a99351575fb8c8799fea5813bc
SHA18b6d008492ee6a1cd217bc7465f2ecec0e97f558
SHA256179b7e3db0960ba8fcde1d8ec35bcb29956c0a13a7e89c29be6cbd8a445310d2
SHA5125313da84d9eea08fb602bd9491541f4a74cd5db85d304b81d60f36d6212f54b2d5b03bedeb4bd8d844cb1c897ed0531ac39022ba6846230febec0fa0152a3b13
-
Filesize
39KB
MD50772e8a99351575fb8c8799fea5813bc
SHA18b6d008492ee6a1cd217bc7465f2ecec0e97f558
SHA256179b7e3db0960ba8fcde1d8ec35bcb29956c0a13a7e89c29be6cbd8a445310d2
SHA5125313da84d9eea08fb602bd9491541f4a74cd5db85d304b81d60f36d6212f54b2d5b03bedeb4bd8d844cb1c897ed0531ac39022ba6846230febec0fa0152a3b13
-
Filesize
39KB
MD50772e8a99351575fb8c8799fea5813bc
SHA18b6d008492ee6a1cd217bc7465f2ecec0e97f558
SHA256179b7e3db0960ba8fcde1d8ec35bcb29956c0a13a7e89c29be6cbd8a445310d2
SHA5125313da84d9eea08fb602bd9491541f4a74cd5db85d304b81d60f36d6212f54b2d5b03bedeb4bd8d844cb1c897ed0531ac39022ba6846230febec0fa0152a3b13