Analysis
-
max time kernel
200s -
max time network
210s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 21:33
Static task
static1
Behavioral task
behavioral1
Sample
b3d7854e1dbc16062f04e64aac60a78c51352148398cb28ee113b485bae4492f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b3d7854e1dbc16062f04e64aac60a78c51352148398cb28ee113b485bae4492f.exe
Resource
win10v2004-20221111-en
General
-
Target
b3d7854e1dbc16062f04e64aac60a78c51352148398cb28ee113b485bae4492f.exe
-
Size
93KB
-
MD5
8e04e65cab967181336b0a02340b260e
-
SHA1
539d8488b7b2441bb73e42092aa056575f7f928a
-
SHA256
b3d7854e1dbc16062f04e64aac60a78c51352148398cb28ee113b485bae4492f
-
SHA512
617cef676d00617a6d1b827dbf868c78d4eb92dfc341f9b9bfe64764100659a4c6128747ab0a57827d69d0baf2d26f75bd3f282494eff1000f63fdd3ab6984d3
-
SSDEEP
1536:/rT5WG67FWBMk/r2mvWh7XjNd3s3WX2o2PYFzwJOpWB8aPzeZIZAKkxTE4n0xC7A://YL7f4r2RheSFrWB8aLe4A/xTEe0Myf
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 800 BCSSync.exe 300 BCSSync.exe -
Loads dropped DLL 2 IoCs
pid Process 1704 b3d7854e1dbc16062f04e64aac60a78c51352148398cb28ee113b485bae4492f.exe 1704 b3d7854e1dbc16062f04e64aac60a78c51352148398cb28ee113b485bae4492f.exe -
Unexpected DNS network traffic destination 5 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1912 set thread context of 1704 1912 b3d7854e1dbc16062f04e64aac60a78c51352148398cb28ee113b485bae4492f.exe 27 PID 800 set thread context of 300 800 BCSSync.exe 29 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe b3d7854e1dbc16062f04e64aac60a78c51352148398cb28ee113b485bae4492f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe b3d7854e1dbc16062f04e64aac60a78c51352148398cb28ee113b485bae4492f.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Fonts\6mSHBnGJY.com b3d7854e1dbc16062f04e64aac60a78c51352148398cb28ee113b485bae4492f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 300 BCSSync.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1912 wrote to memory of 1704 1912 b3d7854e1dbc16062f04e64aac60a78c51352148398cb28ee113b485bae4492f.exe 27 PID 1912 wrote to memory of 1704 1912 b3d7854e1dbc16062f04e64aac60a78c51352148398cb28ee113b485bae4492f.exe 27 PID 1912 wrote to memory of 1704 1912 b3d7854e1dbc16062f04e64aac60a78c51352148398cb28ee113b485bae4492f.exe 27 PID 1912 wrote to memory of 1704 1912 b3d7854e1dbc16062f04e64aac60a78c51352148398cb28ee113b485bae4492f.exe 27 PID 1912 wrote to memory of 1704 1912 b3d7854e1dbc16062f04e64aac60a78c51352148398cb28ee113b485bae4492f.exe 27 PID 1912 wrote to memory of 1704 1912 b3d7854e1dbc16062f04e64aac60a78c51352148398cb28ee113b485bae4492f.exe 27 PID 1912 wrote to memory of 1704 1912 b3d7854e1dbc16062f04e64aac60a78c51352148398cb28ee113b485bae4492f.exe 27 PID 1912 wrote to memory of 1704 1912 b3d7854e1dbc16062f04e64aac60a78c51352148398cb28ee113b485bae4492f.exe 27 PID 1912 wrote to memory of 1704 1912 b3d7854e1dbc16062f04e64aac60a78c51352148398cb28ee113b485bae4492f.exe 27 PID 1704 wrote to memory of 800 1704 b3d7854e1dbc16062f04e64aac60a78c51352148398cb28ee113b485bae4492f.exe 28 PID 1704 wrote to memory of 800 1704 b3d7854e1dbc16062f04e64aac60a78c51352148398cb28ee113b485bae4492f.exe 28 PID 1704 wrote to memory of 800 1704 b3d7854e1dbc16062f04e64aac60a78c51352148398cb28ee113b485bae4492f.exe 28 PID 1704 wrote to memory of 800 1704 b3d7854e1dbc16062f04e64aac60a78c51352148398cb28ee113b485bae4492f.exe 28 PID 800 wrote to memory of 300 800 BCSSync.exe 29 PID 800 wrote to memory of 300 800 BCSSync.exe 29 PID 800 wrote to memory of 300 800 BCSSync.exe 29 PID 800 wrote to memory of 300 800 BCSSync.exe 29 PID 800 wrote to memory of 300 800 BCSSync.exe 29 PID 800 wrote to memory of 300 800 BCSSync.exe 29 PID 800 wrote to memory of 300 800 BCSSync.exe 29 PID 800 wrote to memory of 300 800 BCSSync.exe 29 PID 800 wrote to memory of 300 800 BCSSync.exe 29 PID 300 wrote to memory of 628 300 BCSSync.exe 30 PID 300 wrote to memory of 628 300 BCSSync.exe 30 PID 300 wrote to memory of 628 300 BCSSync.exe 30 PID 300 wrote to memory of 628 300 BCSSync.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3d7854e1dbc16062f04e64aac60a78c51352148398cb28ee113b485bae4492f.exe"C:\Users\Admin\AppData\Local\Temp\b3d7854e1dbc16062f04e64aac60a78c51352148398cb28ee113b485bae4492f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\b3d7854e1dbc16062f04e64aac60a78c51352148398cb28ee113b485bae4492f.exe"C:\Users\Admin\AppData\Local\Temp\b3d7854e1dbc16062f04e64aac60a78c51352148398cb28ee113b485bae4492f.exe"2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\b3d7854e1dbc16062f04e64aac60a78c51352148398cb28ee113b485bae4492f.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\b3d7854e1dbc16062f04e64aac60a78c51352148398cb28ee113b485bae4492f.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:300 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe" "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\b3d7854e1dbc16062f04e64aac60a78c51352148398cb28ee113b485bae4492f.exe5⤵PID:628
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD561f4518a6606b59a5ecc89ba50484b7c
SHA1c5449b03c73a4f61a8eaddd74b9b85c97870e736
SHA25645ff987cee09df7f05cad67055e47774d81fcaab6596a04fbf36ed49f69e81be
SHA512170b3110bb329261440acb7c775eacc490fac726e36df120a0285a4d7a3815d1c82e518ecaafa6b50e667e1a1219086830bdc4940e3e279f61e046f53e18daff
-
Filesize
93KB
MD561f4518a6606b59a5ecc89ba50484b7c
SHA1c5449b03c73a4f61a8eaddd74b9b85c97870e736
SHA25645ff987cee09df7f05cad67055e47774d81fcaab6596a04fbf36ed49f69e81be
SHA512170b3110bb329261440acb7c775eacc490fac726e36df120a0285a4d7a3815d1c82e518ecaafa6b50e667e1a1219086830bdc4940e3e279f61e046f53e18daff
-
Filesize
93KB
MD561f4518a6606b59a5ecc89ba50484b7c
SHA1c5449b03c73a4f61a8eaddd74b9b85c97870e736
SHA25645ff987cee09df7f05cad67055e47774d81fcaab6596a04fbf36ed49f69e81be
SHA512170b3110bb329261440acb7c775eacc490fac726e36df120a0285a4d7a3815d1c82e518ecaafa6b50e667e1a1219086830bdc4940e3e279f61e046f53e18daff
-
Filesize
93KB
MD561f4518a6606b59a5ecc89ba50484b7c
SHA1c5449b03c73a4f61a8eaddd74b9b85c97870e736
SHA25645ff987cee09df7f05cad67055e47774d81fcaab6596a04fbf36ed49f69e81be
SHA512170b3110bb329261440acb7c775eacc490fac726e36df120a0285a4d7a3815d1c82e518ecaafa6b50e667e1a1219086830bdc4940e3e279f61e046f53e18daff
-
Filesize
93KB
MD561f4518a6606b59a5ecc89ba50484b7c
SHA1c5449b03c73a4f61a8eaddd74b9b85c97870e736
SHA25645ff987cee09df7f05cad67055e47774d81fcaab6596a04fbf36ed49f69e81be
SHA512170b3110bb329261440acb7c775eacc490fac726e36df120a0285a4d7a3815d1c82e518ecaafa6b50e667e1a1219086830bdc4940e3e279f61e046f53e18daff