Analysis
-
max time kernel
1s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
03/01/2024, 15:41
Behavioral task
behavioral1
Sample
bca2dcc6f1aa83bd763c8a423c7ad268.exe
Resource
win7-20231215-en
General
-
Target
bca2dcc6f1aa83bd763c8a423c7ad268.exe
-
Size
156KB
-
MD5
bca2dcc6f1aa83bd763c8a423c7ad268
-
SHA1
d46debc4e02485cf31c407f5fbf89185216e439b
-
SHA256
60da0200f3a3ed4c5328f6c6488bb8868c2e228fbd99bd1ea9fa5c3761170c19
-
SHA512
e0a91a4691dd2700044ff5f7e3efdbd042e30d48ff1bd51a66642da349cc763bd811d549e01d9c218c4ac3e8d6002b6122ba140c0b2485d2219c1e4ade21698e
-
SSDEEP
384:+BdCJAKQDuuOFZyUVpULCgDb2prxVTw24I+6Al6zKyXKKDglgTlkgUH/a4QR:MdCyTDcZyUpULCgodM96eyX5OfVm
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2496 attrib.exe -
Executes dropped EXE 1 IoCs
pid Process 3292 uauhost.exe -
resource yara_rule behavioral2/memory/4536-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000600000001e5df-4.dat upx behavioral2/memory/4536-5-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Debug\uauhost.exe bca2dcc6f1aa83bd763c8a423c7ad268.exe File opened for modification C:\Windows\Debug\uauhost.exe bca2dcc6f1aa83bd763c8a423c7ad268.exe File opened for modification C:\Windows\Debug\uauhost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4536 wrote to memory of 2496 4536 bca2dcc6f1aa83bd763c8a423c7ad268.exe 13 PID 4536 wrote to memory of 2496 4536 bca2dcc6f1aa83bd763c8a423c7ad268.exe 13 PID 4536 wrote to memory of 2496 4536 bca2dcc6f1aa83bd763c8a423c7ad268.exe 13 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2496 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bca2dcc6f1aa83bd763c8a423c7ad268.exe"C:\Users\Admin\AppData\Local\Temp\bca2dcc6f1aa83bd763c8a423c7ad268.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\uauhost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:2496
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\BCA2DC~1.EXE > nul2⤵PID:1792
-
-
C:\Windows\Debug\uauhost.exeC:\Windows\Debug\uauhost.exe1⤵
- Executes dropped EXE
PID:3292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD510da937a2505390a29eef1d0e4fad128
SHA110f062718179a46078fa4ff65cc1cf9b032f7400
SHA2561dfe451a15701f85a07fe472d0c2fe2532dbaeacaaad0b86965589552711d1af
SHA5128c8cd510a24e6ebae9e73b3e09caa0c8926bc258be61345fcbbfacdd9bff17ccbd6033cd4f0868844f5a8457fd7bac4756cfed37d0eb070bcd93139610d44576