Analysis
-
max time kernel
0s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28-12-2023 00:23
Static task
static1
Behavioral task
behavioral1
Sample
bc134ee57553cda5893b69950d8616f4.exe
Resource
win7-20231129-en
General
-
Target
bc134ee57553cda5893b69950d8616f4.exe
-
Size
1.7MB
-
MD5
bc134ee57553cda5893b69950d8616f4
-
SHA1
b0f814326fa736e8ad47d92a5a5d8d42eec2e037
-
SHA256
dd2a5dcb0106f4c6e7b91ececccef95ff651daa95d78210d41287fe1de0cb639
-
SHA512
c6a6ba670bba5c0c029e98feaa5123563080c05bca28cb96a4034a10f13eec5ca57db20d5d65ee584216f14468dbee30bd18b0c82145fff38a7593574fcab58d
-
SSDEEP
49152:NunK8G2JQVT46bJQ+bfDTsrA0hleklFNARfYblgmZ:NKK8pu1hJQ+bfDTRRcFNpl5
Malware Config
Extracted
ffdroider
http://128.1.32.84
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2320 Crack.exe -
Loads dropped DLL 5 IoCs
pid Process 2888 bc134ee57553cda5893b69950d8616f4.exe 2888 bc134ee57553cda5893b69950d8616f4.exe 2888 bc134ee57553cda5893b69950d8616f4.exe 2888 bc134ee57553cda5893b69950d8616f4.exe 2888 bc134ee57553cda5893b69950d8616f4.exe -
resource yara_rule behavioral1/memory/2676-47-0x0000000000400000-0x000000000064F000-memory.dmp vmprotect behavioral1/memory/2676-46-0x0000000000400000-0x000000000064F000-memory.dmp vmprotect behavioral1/memory/2676-74-0x0000000000400000-0x000000000064F000-memory.dmp vmprotect -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process 2468 2676 WerFault.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2320 2888 bc134ee57553cda5893b69950d8616f4.exe 26 PID 2888 wrote to memory of 2320 2888 bc134ee57553cda5893b69950d8616f4.exe 26 PID 2888 wrote to memory of 2320 2888 bc134ee57553cda5893b69950d8616f4.exe 26 PID 2888 wrote to memory of 2320 2888 bc134ee57553cda5893b69950d8616f4.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc134ee57553cda5893b69950d8616f4.exe"C:\Users\Admin\AppData\Local\Temp\bc134ee57553cda5893b69950d8616f4.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\note866.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\note866.exe"2⤵PID:2676
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe"2⤵
- Executes dropped EXE
PID:2320
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:2880
-
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵PID:2476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 1841⤵
- Program crash
PID:2468
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe" -a1⤵PID:2560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD550629a14eca2b02fa4caac3a9cbb954e
SHA17cb40aaf90b11c013be142c0a992277df09378e8
SHA256cd4a076138cb8cce0e14322cef7a8db3c5cdca158471a5f4a1f8821cd669f4c4
SHA512531024b0b9534fe929fa5ee55e0f8d277e3643390dbad5bbfb01a05db8af7e2f465aeb5df886ea3e890e98120912a1c5d4a1d86e2a1d2b800079982c34508f61