Analysis
-
max time kernel
2s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01-01-2024 11:36
Behavioral task
behavioral1
Sample
bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3.exe
Resource
win10v2004-20231215-en
General
-
Target
bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3.exe
-
Size
536KB
-
MD5
61aece6ec6fe08c9c39f27d7d49d7e3c
-
SHA1
683006c1b4f0c5a7c95b126e7a6311cd3a6d9cdc
-
SHA256
bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3
-
SHA512
b89113d97cb5ed0f6e6a57e05e4a6f599ca8abf843a2650f753e88da6034dfc8b1f092c9778e91d3ae14e359b1bea5ae41dad3cb7a2cfa71519806d641429ca0
-
SSDEEP
12288:Yhf0Bs9bDDq9hu53Ltp/p+gPhhwPOaoTJRkmOkx2LIa:YdQyDL9xp/BGA1RkmOkx2LF
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1252-0-0x0000000001050000-0x0000000001152000-memory.dmp upx behavioral1/memory/1252-113-0x0000000001050000-0x0000000001152000-memory.dmp upx behavioral1/memory/1252-371-0x0000000001050000-0x0000000001152000-memory.dmp upx behavioral1/memory/1252-514-0x0000000001050000-0x0000000001152000-memory.dmp upx behavioral1/memory/1252-696-0x0000000001050000-0x0000000001152000-memory.dmp upx behavioral1/memory/1252-701-0x0000000001050000-0x0000000001152000-memory.dmp upx -
Unexpected DNS network traffic destination 4 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 223.5.5.5 Destination IP 223.5.5.5 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\156f48 bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1252 bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3.exe 1252 bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3.exe 1252 bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3.exe 1252 bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3.exe 1252 bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3.exe 1200 Explorer.EXE 1200 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1252 bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3.exe Token: SeTcbPrivilege 1252 bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3.exe Token: SeDebugPrivilege 1252 bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3.exe Token: SeDebugPrivilege 1200 Explorer.EXE Token: SeTcbPrivilege 1200 Explorer.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1252 wrote to memory of 1200 1252 bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3.exe 12 PID 1252 wrote to memory of 1200 1252 bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3.exe 12 PID 1252 wrote to memory of 1200 1252 bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3.exe 12
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3.exe"C:\Users\Admin\AppData\Local\Temp\bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1252
-