Analysis
-
max time kernel
267s -
max time network
364s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 11:49
Static task
static1
Behavioral task
behavioral1
Sample
9e5668d4e8a58777225708f10409ee7177cd6395737f5b0160e6217ee4035ff6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9e5668d4e8a58777225708f10409ee7177cd6395737f5b0160e6217ee4035ff6.exe
Resource
win10v2004-20221111-en
General
-
Target
9e5668d4e8a58777225708f10409ee7177cd6395737f5b0160e6217ee4035ff6.exe
-
Size
35KB
-
MD5
036340b9e64a4a49c442a23d6e4ee5a8
-
SHA1
33a64b0b2e0608468aa78fc3ea942de24fd2b5d0
-
SHA256
9e5668d4e8a58777225708f10409ee7177cd6395737f5b0160e6217ee4035ff6
-
SHA512
7658cf5acc97ae1e0180c469a1cd87dd4b67f5777effdf0ee681ce15d22bad3611c5759439ba576c8851f18c8c7141d50a36c76ea2a7fd3a942f4cb7fa124c99
-
SSDEEP
384:x9RlQG13BLgexxxaR0O834rfmAT/5bcicoAVmaqsj7T0oY7cQ67oJk1Ziwf6hycF:TQGpmes+olciha/sw8cF6srxLwN97jT
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1548 BCSSync.exe 916 BCSSync.exe -
Loads dropped DLL 2 IoCs
pid Process 1768 9e5668d4e8a58777225708f10409ee7177cd6395737f5b0160e6217ee4035ff6.exe 1768 9e5668d4e8a58777225708f10409ee7177cd6395737f5b0160e6217ee4035ff6.exe -
Unexpected DNS network traffic destination 5 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1184 set thread context of 1768 1184 9e5668d4e8a58777225708f10409ee7177cd6395737f5b0160e6217ee4035ff6.exe 28 PID 1548 set thread context of 916 1548 BCSSync.exe 30 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe 9e5668d4e8a58777225708f10409ee7177cd6395737f5b0160e6217ee4035ff6.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe 9e5668d4e8a58777225708f10409ee7177cd6395737f5b0160e6217ee4035ff6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1768 9e5668d4e8a58777225708f10409ee7177cd6395737f5b0160e6217ee4035ff6.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1184 9e5668d4e8a58777225708f10409ee7177cd6395737f5b0160e6217ee4035ff6.exe 1548 BCSSync.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1184 wrote to memory of 1768 1184 9e5668d4e8a58777225708f10409ee7177cd6395737f5b0160e6217ee4035ff6.exe 28 PID 1184 wrote to memory of 1768 1184 9e5668d4e8a58777225708f10409ee7177cd6395737f5b0160e6217ee4035ff6.exe 28 PID 1184 wrote to memory of 1768 1184 9e5668d4e8a58777225708f10409ee7177cd6395737f5b0160e6217ee4035ff6.exe 28 PID 1184 wrote to memory of 1768 1184 9e5668d4e8a58777225708f10409ee7177cd6395737f5b0160e6217ee4035ff6.exe 28 PID 1184 wrote to memory of 1768 1184 9e5668d4e8a58777225708f10409ee7177cd6395737f5b0160e6217ee4035ff6.exe 28 PID 1184 wrote to memory of 1768 1184 9e5668d4e8a58777225708f10409ee7177cd6395737f5b0160e6217ee4035ff6.exe 28 PID 1184 wrote to memory of 1768 1184 9e5668d4e8a58777225708f10409ee7177cd6395737f5b0160e6217ee4035ff6.exe 28 PID 1184 wrote to memory of 1768 1184 9e5668d4e8a58777225708f10409ee7177cd6395737f5b0160e6217ee4035ff6.exe 28 PID 1184 wrote to memory of 1768 1184 9e5668d4e8a58777225708f10409ee7177cd6395737f5b0160e6217ee4035ff6.exe 28 PID 1768 wrote to memory of 1548 1768 9e5668d4e8a58777225708f10409ee7177cd6395737f5b0160e6217ee4035ff6.exe 29 PID 1768 wrote to memory of 1548 1768 9e5668d4e8a58777225708f10409ee7177cd6395737f5b0160e6217ee4035ff6.exe 29 PID 1768 wrote to memory of 1548 1768 9e5668d4e8a58777225708f10409ee7177cd6395737f5b0160e6217ee4035ff6.exe 29 PID 1768 wrote to memory of 1548 1768 9e5668d4e8a58777225708f10409ee7177cd6395737f5b0160e6217ee4035ff6.exe 29 PID 1548 wrote to memory of 916 1548 BCSSync.exe 30 PID 1548 wrote to memory of 916 1548 BCSSync.exe 30 PID 1548 wrote to memory of 916 1548 BCSSync.exe 30 PID 1548 wrote to memory of 916 1548 BCSSync.exe 30 PID 1548 wrote to memory of 916 1548 BCSSync.exe 30 PID 1548 wrote to memory of 916 1548 BCSSync.exe 30 PID 1548 wrote to memory of 916 1548 BCSSync.exe 30 PID 1548 wrote to memory of 916 1548 BCSSync.exe 30 PID 1548 wrote to memory of 916 1548 BCSSync.exe 30 PID 916 wrote to memory of 1160 916 BCSSync.exe 31 PID 916 wrote to memory of 1160 916 BCSSync.exe 31 PID 916 wrote to memory of 1160 916 BCSSync.exe 31 PID 916 wrote to memory of 1160 916 BCSSync.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e5668d4e8a58777225708f10409ee7177cd6395737f5b0160e6217ee4035ff6.exe"C:\Users\Admin\AppData\Local\Temp\9e5668d4e8a58777225708f10409ee7177cd6395737f5b0160e6217ee4035ff6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\9e5668d4e8a58777225708f10409ee7177cd6395737f5b0160e6217ee4035ff6.exe"C:\Users\Admin\AppData\Local\Temp\9e5668d4e8a58777225708f10409ee7177cd6395737f5b0160e6217ee4035ff6.exe"2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\9e5668d4e8a58777225708f10409ee7177cd6395737f5b0160e6217ee4035ff6.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\9e5668d4e8a58777225708f10409ee7177cd6395737f5b0160e6217ee4035ff6.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe" "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\9e5668d4e8a58777225708f10409ee7177cd6395737f5b0160e6217ee4035ff6.exe5⤵PID:1160
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5ba81981b3c4b9ba0bb61821c513ce0b2
SHA18d64e781b8219f6f4e3bc2d68f3e14e981f7c066
SHA256c19fa3cd34bbb6ac3ae61b1bd7ae5249e46ed616f74a3e88d766653877d597bd
SHA5124948c5ddc4cfd1f8d4c867276e8b75a35b2c4392db4150bf6f6d179726dc13fe6eab223fa6477d85cb564ab60e580848526ea01ceb845b4b4caa7452e5d6c26e
-
Filesize
35KB
MD5ba81981b3c4b9ba0bb61821c513ce0b2
SHA18d64e781b8219f6f4e3bc2d68f3e14e981f7c066
SHA256c19fa3cd34bbb6ac3ae61b1bd7ae5249e46ed616f74a3e88d766653877d597bd
SHA5124948c5ddc4cfd1f8d4c867276e8b75a35b2c4392db4150bf6f6d179726dc13fe6eab223fa6477d85cb564ab60e580848526ea01ceb845b4b4caa7452e5d6c26e
-
Filesize
35KB
MD5ba81981b3c4b9ba0bb61821c513ce0b2
SHA18d64e781b8219f6f4e3bc2d68f3e14e981f7c066
SHA256c19fa3cd34bbb6ac3ae61b1bd7ae5249e46ed616f74a3e88d766653877d597bd
SHA5124948c5ddc4cfd1f8d4c867276e8b75a35b2c4392db4150bf6f6d179726dc13fe6eab223fa6477d85cb564ab60e580848526ea01ceb845b4b4caa7452e5d6c26e
-
Filesize
35KB
MD5ba81981b3c4b9ba0bb61821c513ce0b2
SHA18d64e781b8219f6f4e3bc2d68f3e14e981f7c066
SHA256c19fa3cd34bbb6ac3ae61b1bd7ae5249e46ed616f74a3e88d766653877d597bd
SHA5124948c5ddc4cfd1f8d4c867276e8b75a35b2c4392db4150bf6f6d179726dc13fe6eab223fa6477d85cb564ab60e580848526ea01ceb845b4b4caa7452e5d6c26e
-
Filesize
35KB
MD5ba81981b3c4b9ba0bb61821c513ce0b2
SHA18d64e781b8219f6f4e3bc2d68f3e14e981f7c066
SHA256c19fa3cd34bbb6ac3ae61b1bd7ae5249e46ed616f74a3e88d766653877d597bd
SHA5124948c5ddc4cfd1f8d4c867276e8b75a35b2c4392db4150bf6f6d179726dc13fe6eab223fa6477d85cb564ab60e580848526ea01ceb845b4b4caa7452e5d6c26e