Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30-12-2023 20:55

General

  • Target

    1c481e608b35e1149d93ec1f9aefdf71.exe

  • Size

    41KB

  • MD5

    1c481e608b35e1149d93ec1f9aefdf71

  • SHA1

    69c3ba5addfd49bb1824ff15334e0422d2c1ae65

  • SHA256

    275d70db07f89259bcc478ce5da2259a0dc12b2dd630c8b0c6160e0b9a47e6bf

  • SHA512

    3cb374039bc717e53fc9fdbf9f02a56b0688f7d99d2592eeb961719ab43922551b7f89267026332fd78464f497a7864558f2952eb7bab5f01498d00be0062dc8

  • SSDEEP

    768:Bi6MbK0BYoGfqCZlySRO2woK/Z6YIhoFtQjXyEJvc8JzKZr12qhZhXX:cJWoYnqCjao/HzxCQzKZrYq5XX

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 5 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c481e608b35e1149d93ec1f9aefdf71.exe
    "C:\Users\Admin\AppData\Local\Temp\1c481e608b35e1149d93ec1f9aefdf71.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:2444
    • C:\Users\Admin\AppData\Local\Temp\1c481e608b35e1149d93ec1f9aefdf71.exe
      "C:\Users\Admin\AppData\Local\Temp\1c481e608b35e1149d93ec1f9aefdf71.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1988
      • C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe
        "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\1c481e608b35e1149d93ec1f9aefdf71.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of WriteProcessMemory
        PID:2804
  • C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe
    "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\1c481e608b35e1149d93ec1f9aefdf71.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe
      "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe" "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\1c481e608b35e1149d93ec1f9aefdf71.exe
      2⤵
        PID:2860

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe

      Filesize

      41KB

      MD5

      46090a2a835c603e79bcf904a47a5e3d

      SHA1

      7069c24cdb860df55a74a631b8c9a7b79c0705f5

      SHA256

      9ffc3f1924f678376035225d018111c5a87549463c00b63632da047295646067

      SHA512

      7a626977e6af58b76079f8c8fa8e82776a659b1fcc819f76c2161584b124fa08d9405c7c3919179da284367defb7dd857ac012bf4a9930031b99b0a84c86d405

    • memory/1980-48-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1988-12-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1988-10-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1988-8-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1988-14-0x0000000010000000-0x000000001000A000-memory.dmp

      Filesize

      40KB

    • memory/1988-13-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1988-6-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1988-4-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1988-2-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1988-0-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB