Analysis
-
max time kernel
138s -
max time network
167s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 13:21
Static task
static1
Behavioral task
behavioral1
Sample
bbee32736d4e92febb0219e452e3d351366bf72821b8766576a9e4a4882f0930.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bbee32736d4e92febb0219e452e3d351366bf72821b8766576a9e4a4882f0930.exe
Resource
win10v2004-20221111-en
General
-
Target
bbee32736d4e92febb0219e452e3d351366bf72821b8766576a9e4a4882f0930.exe
-
Size
98KB
-
MD5
1b7e24e3e1c10083f90bc9948d11611d
-
SHA1
438911aa61ebbc78e992ba5ddf1f96adea3ac3f8
-
SHA256
bbee32736d4e92febb0219e452e3d351366bf72821b8766576a9e4a4882f0930
-
SHA512
f212f16e578426f3ca9e8c528c5557bc88ef89d2eec820ae2aac91e6ba9cff0ac665b9b05c45e293a25d77d351ff1c64d4c6fb28eca0d8efd7fab000dfc14131
-
SSDEEP
3072:46V87r/x8BZ/rWLfSo15FteivzoAkQpyTphpnf:46er/c6eo1HteMoS4fpnf
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2044 BCSSync.exe 2008 BCSSync.exe -
Loads dropped DLL 3 IoCs
pid Process 896 bbee32736d4e92febb0219e452e3d351366bf72821b8766576a9e4a4882f0930.exe 896 bbee32736d4e92febb0219e452e3d351366bf72821b8766576a9e4a4882f0930.exe 2044 BCSSync.exe -
Unexpected DNS network traffic destination 5 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 856 set thread context of 896 856 bbee32736d4e92febb0219e452e3d351366bf72821b8766576a9e4a4882f0930.exe 27 PID 2044 set thread context of 2008 2044 BCSSync.exe 29 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe bbee32736d4e92febb0219e452e3d351366bf72821b8766576a9e4a4882f0930.exe File created C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe bbee32736d4e92febb0219e452e3d351366bf72821b8766576a9e4a4882f0930.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Fonts\8k2o44.com bbee32736d4e92febb0219e452e3d351366bf72821b8766576a9e4a4882f0930.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2008 BCSSync.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 856 wrote to memory of 896 856 bbee32736d4e92febb0219e452e3d351366bf72821b8766576a9e4a4882f0930.exe 27 PID 856 wrote to memory of 896 856 bbee32736d4e92febb0219e452e3d351366bf72821b8766576a9e4a4882f0930.exe 27 PID 856 wrote to memory of 896 856 bbee32736d4e92febb0219e452e3d351366bf72821b8766576a9e4a4882f0930.exe 27 PID 856 wrote to memory of 896 856 bbee32736d4e92febb0219e452e3d351366bf72821b8766576a9e4a4882f0930.exe 27 PID 856 wrote to memory of 896 856 bbee32736d4e92febb0219e452e3d351366bf72821b8766576a9e4a4882f0930.exe 27 PID 856 wrote to memory of 896 856 bbee32736d4e92febb0219e452e3d351366bf72821b8766576a9e4a4882f0930.exe 27 PID 856 wrote to memory of 896 856 bbee32736d4e92febb0219e452e3d351366bf72821b8766576a9e4a4882f0930.exe 27 PID 856 wrote to memory of 896 856 bbee32736d4e92febb0219e452e3d351366bf72821b8766576a9e4a4882f0930.exe 27 PID 856 wrote to memory of 896 856 bbee32736d4e92febb0219e452e3d351366bf72821b8766576a9e4a4882f0930.exe 27 PID 896 wrote to memory of 2044 896 bbee32736d4e92febb0219e452e3d351366bf72821b8766576a9e4a4882f0930.exe 28 PID 896 wrote to memory of 2044 896 bbee32736d4e92febb0219e452e3d351366bf72821b8766576a9e4a4882f0930.exe 28 PID 896 wrote to memory of 2044 896 bbee32736d4e92febb0219e452e3d351366bf72821b8766576a9e4a4882f0930.exe 28 PID 896 wrote to memory of 2044 896 bbee32736d4e92febb0219e452e3d351366bf72821b8766576a9e4a4882f0930.exe 28 PID 2044 wrote to memory of 2008 2044 BCSSync.exe 29 PID 2044 wrote to memory of 2008 2044 BCSSync.exe 29 PID 2044 wrote to memory of 2008 2044 BCSSync.exe 29 PID 2044 wrote to memory of 2008 2044 BCSSync.exe 29 PID 2044 wrote to memory of 2008 2044 BCSSync.exe 29 PID 2044 wrote to memory of 2008 2044 BCSSync.exe 29 PID 2044 wrote to memory of 2008 2044 BCSSync.exe 29 PID 2044 wrote to memory of 2008 2044 BCSSync.exe 29 PID 2044 wrote to memory of 2008 2044 BCSSync.exe 29 PID 2008 wrote to memory of 756 2008 BCSSync.exe 30 PID 2008 wrote to memory of 756 2008 BCSSync.exe 30 PID 2008 wrote to memory of 756 2008 BCSSync.exe 30 PID 2008 wrote to memory of 756 2008 BCSSync.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbee32736d4e92febb0219e452e3d351366bf72821b8766576a9e4a4882f0930.exe"C:\Users\Admin\AppData\Local\Temp\bbee32736d4e92febb0219e452e3d351366bf72821b8766576a9e4a4882f0930.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\bbee32736d4e92febb0219e452e3d351366bf72821b8766576a9e4a4882f0930.exe"C:\Users\Admin\AppData\Local\Temp\bbee32736d4e92febb0219e452e3d351366bf72821b8766576a9e4a4882f0930.exe"2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\bbee32736d4e92febb0219e452e3d351366bf72821b8766576a9e4a4882f0930.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\bbee32736d4e92febb0219e452e3d351366bf72821b8766576a9e4a4882f0930.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe" "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\bbee32736d4e92febb0219e452e3d351366bf72821b8766576a9e4a4882f0930.exe5⤵PID:756
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98KB
MD564d803f8362bbad1f97d0182df20f04e
SHA1490bf3827395fab2c1dbc0beb3a19f641d09ed05
SHA256e6f36f7d8fe32d8e1b904c202cdfffa12c35f7cd5cf6fe5909177fc81fac1003
SHA51270d8ea5123f29d0619cc9914e9168bc8e0ead600129a0a45b1a68bf7a03cfdd92de1726334eca0e31058dcfb3ecdcc6aac515e8d7d2f096f249c67ca3da9d636
-
Filesize
98KB
MD564d803f8362bbad1f97d0182df20f04e
SHA1490bf3827395fab2c1dbc0beb3a19f641d09ed05
SHA256e6f36f7d8fe32d8e1b904c202cdfffa12c35f7cd5cf6fe5909177fc81fac1003
SHA51270d8ea5123f29d0619cc9914e9168bc8e0ead600129a0a45b1a68bf7a03cfdd92de1726334eca0e31058dcfb3ecdcc6aac515e8d7d2f096f249c67ca3da9d636
-
Filesize
98KB
MD564d803f8362bbad1f97d0182df20f04e
SHA1490bf3827395fab2c1dbc0beb3a19f641d09ed05
SHA256e6f36f7d8fe32d8e1b904c202cdfffa12c35f7cd5cf6fe5909177fc81fac1003
SHA51270d8ea5123f29d0619cc9914e9168bc8e0ead600129a0a45b1a68bf7a03cfdd92de1726334eca0e31058dcfb3ecdcc6aac515e8d7d2f096f249c67ca3da9d636
-
Filesize
98KB
MD564d803f8362bbad1f97d0182df20f04e
SHA1490bf3827395fab2c1dbc0beb3a19f641d09ed05
SHA256e6f36f7d8fe32d8e1b904c202cdfffa12c35f7cd5cf6fe5909177fc81fac1003
SHA51270d8ea5123f29d0619cc9914e9168bc8e0ead600129a0a45b1a68bf7a03cfdd92de1726334eca0e31058dcfb3ecdcc6aac515e8d7d2f096f249c67ca3da9d636
-
Filesize
98KB
MD564d803f8362bbad1f97d0182df20f04e
SHA1490bf3827395fab2c1dbc0beb3a19f641d09ed05
SHA256e6f36f7d8fe32d8e1b904c202cdfffa12c35f7cd5cf6fe5909177fc81fac1003
SHA51270d8ea5123f29d0619cc9914e9168bc8e0ead600129a0a45b1a68bf7a03cfdd92de1726334eca0e31058dcfb3ecdcc6aac515e8d7d2f096f249c67ca3da9d636
-
Filesize
98KB
MD564d803f8362bbad1f97d0182df20f04e
SHA1490bf3827395fab2c1dbc0beb3a19f641d09ed05
SHA256e6f36f7d8fe32d8e1b904c202cdfffa12c35f7cd5cf6fe5909177fc81fac1003
SHA51270d8ea5123f29d0619cc9914e9168bc8e0ead600129a0a45b1a68bf7a03cfdd92de1726334eca0e31058dcfb3ecdcc6aac515e8d7d2f096f249c67ca3da9d636