Analysis
-
max time kernel
0s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2024 11:36
Behavioral task
behavioral1
Sample
bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3.exe
Resource
win10v2004-20231215-en
General
-
Target
bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3.exe
-
Size
536KB
-
MD5
61aece6ec6fe08c9c39f27d7d49d7e3c
-
SHA1
683006c1b4f0c5a7c95b126e7a6311cd3a6d9cdc
-
SHA256
bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3
-
SHA512
b89113d97cb5ed0f6e6a57e05e4a6f599ca8abf843a2650f753e88da6034dfc8b1f092c9778e91d3ae14e359b1bea5ae41dad3cb7a2cfa71519806d641429ca0
-
SSDEEP
12288:Yhf0Bs9bDDq9hu53Ltp/p+gPhhwPOaoTJRkmOkx2LIa:YdQyDL9xp/BGA1RkmOkx2LF
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4984-0-0x0000000000590000-0x0000000000692000-memory.dmp upx behavioral2/memory/4984-13-0x0000000000590000-0x0000000000692000-memory.dmp upx behavioral2/memory/4984-24-0x0000000000590000-0x0000000000692000-memory.dmp upx behavioral2/memory/4984-25-0x0000000000590000-0x0000000000692000-memory.dmp upx behavioral2/memory/4984-30-0x0000000000590000-0x0000000000692000-memory.dmp upx behavioral2/memory/4984-42-0x0000000000590000-0x0000000000692000-memory.dmp upx behavioral2/memory/4984-66-0x0000000000590000-0x0000000000692000-memory.dmp upx -
Unexpected DNS network traffic destination 4 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 114.114.114.114 Destination IP 223.5.5.5 Destination IP 114.114.114.114 Destination IP 223.5.5.5 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\5553f0 bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4984 bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3.exe 4984 bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3.exe 4984 bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3.exe 4984 bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3.exe 4984 bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3.exe 4984 bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3.exe 4984 bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3.exe 4984 bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3.exe 3520 Explorer.EXE 3520 Explorer.EXE 3520 Explorer.EXE 3520 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4984 bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3.exe Token: SeTcbPrivilege 4984 bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3.exe Token: SeDebugPrivilege 4984 bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3.exe Token: SeDebugPrivilege 3520 Explorer.EXE Token: SeTcbPrivilege 3520 Explorer.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4984 wrote to memory of 3520 4984 bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3.exe 43 PID 4984 wrote to memory of 3520 4984 bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3.exe 43 PID 4984 wrote to memory of 3520 4984 bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3.exe"C:\Users\Admin\AppData\Local\Temp\bcc726f74726c3f6c784d6de9b9c13d4cb6ca96e248b2fa41b10049981f964f3.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4984
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3520