Analysis
-
max time kernel
126s -
max time network
176s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 10:35
Static task
static1
Behavioral task
behavioral1
Sample
a293ed86a0d378819fdc2319a157a5103f176c7edc0d7c12b2138b117bb29b36.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a293ed86a0d378819fdc2319a157a5103f176c7edc0d7c12b2138b117bb29b36.exe
Resource
win10v2004-20220812-en
General
-
Target
a293ed86a0d378819fdc2319a157a5103f176c7edc0d7c12b2138b117bb29b36.exe
-
Size
98KB
-
MD5
0610baab5481811f0c8b1ad66d0a84a5
-
SHA1
61358455926e33a737a1d187424de93be348faa7
-
SHA256
a293ed86a0d378819fdc2319a157a5103f176c7edc0d7c12b2138b117bb29b36
-
SHA512
9924a514e5d4887751074a76b57bd43f7783316e6661229b5024da03a49e7a138ef36557958d9d1f33697d267ed8612afe6a02e53d01cfff49654e902e7ecbd4
-
SSDEEP
3072:46V87r/x8BZ/rWLfSo15FteivzoAkQpyTphpne:46er/c6eo1HteMoS4fpne
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1052 BCSSync.exe 2004 BCSSync.exe -
Loads dropped DLL 2 IoCs
pid Process 1832 a293ed86a0d378819fdc2319a157a5103f176c7edc0d7c12b2138b117bb29b36.exe 1832 a293ed86a0d378819fdc2319a157a5103f176c7edc0d7c12b2138b117bb29b36.exe -
Unexpected DNS network traffic destination 4 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1668 set thread context of 1832 1668 a293ed86a0d378819fdc2319a157a5103f176c7edc0d7c12b2138b117bb29b36.exe 27 PID 1052 set thread context of 2004 1052 BCSSync.exe 29 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe a293ed86a0d378819fdc2319a157a5103f176c7edc0d7c12b2138b117bb29b36.exe File created C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe a293ed86a0d378819fdc2319a157a5103f176c7edc0d7c12b2138b117bb29b36.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Fonts\8k2o44.com a293ed86a0d378819fdc2319a157a5103f176c7edc0d7c12b2138b117bb29b36.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2004 BCSSync.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1668 wrote to memory of 1832 1668 a293ed86a0d378819fdc2319a157a5103f176c7edc0d7c12b2138b117bb29b36.exe 27 PID 1668 wrote to memory of 1832 1668 a293ed86a0d378819fdc2319a157a5103f176c7edc0d7c12b2138b117bb29b36.exe 27 PID 1668 wrote to memory of 1832 1668 a293ed86a0d378819fdc2319a157a5103f176c7edc0d7c12b2138b117bb29b36.exe 27 PID 1668 wrote to memory of 1832 1668 a293ed86a0d378819fdc2319a157a5103f176c7edc0d7c12b2138b117bb29b36.exe 27 PID 1668 wrote to memory of 1832 1668 a293ed86a0d378819fdc2319a157a5103f176c7edc0d7c12b2138b117bb29b36.exe 27 PID 1668 wrote to memory of 1832 1668 a293ed86a0d378819fdc2319a157a5103f176c7edc0d7c12b2138b117bb29b36.exe 27 PID 1668 wrote to memory of 1832 1668 a293ed86a0d378819fdc2319a157a5103f176c7edc0d7c12b2138b117bb29b36.exe 27 PID 1668 wrote to memory of 1832 1668 a293ed86a0d378819fdc2319a157a5103f176c7edc0d7c12b2138b117bb29b36.exe 27 PID 1668 wrote to memory of 1832 1668 a293ed86a0d378819fdc2319a157a5103f176c7edc0d7c12b2138b117bb29b36.exe 27 PID 1832 wrote to memory of 1052 1832 a293ed86a0d378819fdc2319a157a5103f176c7edc0d7c12b2138b117bb29b36.exe 28 PID 1832 wrote to memory of 1052 1832 a293ed86a0d378819fdc2319a157a5103f176c7edc0d7c12b2138b117bb29b36.exe 28 PID 1832 wrote to memory of 1052 1832 a293ed86a0d378819fdc2319a157a5103f176c7edc0d7c12b2138b117bb29b36.exe 28 PID 1832 wrote to memory of 1052 1832 a293ed86a0d378819fdc2319a157a5103f176c7edc0d7c12b2138b117bb29b36.exe 28 PID 1052 wrote to memory of 2004 1052 BCSSync.exe 29 PID 1052 wrote to memory of 2004 1052 BCSSync.exe 29 PID 1052 wrote to memory of 2004 1052 BCSSync.exe 29 PID 1052 wrote to memory of 2004 1052 BCSSync.exe 29 PID 1052 wrote to memory of 2004 1052 BCSSync.exe 29 PID 1052 wrote to memory of 2004 1052 BCSSync.exe 29 PID 1052 wrote to memory of 2004 1052 BCSSync.exe 29 PID 1052 wrote to memory of 2004 1052 BCSSync.exe 29 PID 1052 wrote to memory of 2004 1052 BCSSync.exe 29 PID 2004 wrote to memory of 808 2004 BCSSync.exe 30 PID 2004 wrote to memory of 808 2004 BCSSync.exe 30 PID 2004 wrote to memory of 808 2004 BCSSync.exe 30 PID 2004 wrote to memory of 808 2004 BCSSync.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a293ed86a0d378819fdc2319a157a5103f176c7edc0d7c12b2138b117bb29b36.exe"C:\Users\Admin\AppData\Local\Temp\a293ed86a0d378819fdc2319a157a5103f176c7edc0d7c12b2138b117bb29b36.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\a293ed86a0d378819fdc2319a157a5103f176c7edc0d7c12b2138b117bb29b36.exe"C:\Users\Admin\AppData\Local\Temp\a293ed86a0d378819fdc2319a157a5103f176c7edc0d7c12b2138b117bb29b36.exe"2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\a293ed86a0d378819fdc2319a157a5103f176c7edc0d7c12b2138b117bb29b36.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\a293ed86a0d378819fdc2319a157a5103f176c7edc0d7c12b2138b117bb29b36.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe" "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\a293ed86a0d378819fdc2319a157a5103f176c7edc0d7c12b2138b117bb29b36.exe5⤵PID:808
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98KB
MD5e4b22406b589f26e6f66b41986863dcf
SHA18547957f08088dffededa494e7f33d11acf75064
SHA2564a01d076c643988bd4b9db1bf47a933e20ea9c8a5e061e67e9e5f292aa94de97
SHA5122826ea507474e788813a82b2aa80350cbd4d56987f584d0323ecdc3654daa540047fecdfcd90b52ed8fd47d32d695bd3ae1f09a822ed3eda56393460c491c8b9
-
Filesize
98KB
MD5e4b22406b589f26e6f66b41986863dcf
SHA18547957f08088dffededa494e7f33d11acf75064
SHA2564a01d076c643988bd4b9db1bf47a933e20ea9c8a5e061e67e9e5f292aa94de97
SHA5122826ea507474e788813a82b2aa80350cbd4d56987f584d0323ecdc3654daa540047fecdfcd90b52ed8fd47d32d695bd3ae1f09a822ed3eda56393460c491c8b9
-
Filesize
98KB
MD5e4b22406b589f26e6f66b41986863dcf
SHA18547957f08088dffededa494e7f33d11acf75064
SHA2564a01d076c643988bd4b9db1bf47a933e20ea9c8a5e061e67e9e5f292aa94de97
SHA5122826ea507474e788813a82b2aa80350cbd4d56987f584d0323ecdc3654daa540047fecdfcd90b52ed8fd47d32d695bd3ae1f09a822ed3eda56393460c491c8b9
-
Filesize
98KB
MD5e4b22406b589f26e6f66b41986863dcf
SHA18547957f08088dffededa494e7f33d11acf75064
SHA2564a01d076c643988bd4b9db1bf47a933e20ea9c8a5e061e67e9e5f292aa94de97
SHA5122826ea507474e788813a82b2aa80350cbd4d56987f584d0323ecdc3654daa540047fecdfcd90b52ed8fd47d32d695bd3ae1f09a822ed3eda56393460c491c8b9
-
Filesize
98KB
MD5e4b22406b589f26e6f66b41986863dcf
SHA18547957f08088dffededa494e7f33d11acf75064
SHA2564a01d076c643988bd4b9db1bf47a933e20ea9c8a5e061e67e9e5f292aa94de97
SHA5122826ea507474e788813a82b2aa80350cbd4d56987f584d0323ecdc3654daa540047fecdfcd90b52ed8fd47d32d695bd3ae1f09a822ed3eda56393460c491c8b9