Analysis
-
max time kernel
139s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2024 07:33
Static task
static1
Behavioral task
behavioral1
Sample
79a4be9c06f2d6acd0f24adde9488037.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
79a4be9c06f2d6acd0f24adde9488037.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$TEMP/biclient.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$TEMP/biclient.exe
Resource
win10v2004-20231215-en
General
-
Target
79a4be9c06f2d6acd0f24adde9488037.exe
-
Size
159KB
-
MD5
79a4be9c06f2d6acd0f24adde9488037
-
SHA1
2aae36bfcd5106e3b283e1bf567afb8de961a2de
-
SHA256
16bd53faca8c7993da417cee86d52ec1d8df5d876b18134fab008ab11e67ed1c
-
SHA512
bb53f0183e1519d99b244bbc0954cb8301c52e451b7eb425b59b2db25d9fe1eaec1c9e618b7bb356e23de8fda3d64a572c229ecf5770d4ff269a85725de445ed
-
SSDEEP
3072:v22ihA0m3BJf0AeUoNnC70froVkPl4ggueUNwCZVnqEXnjvp+9:gA0m3T0AeNC70DoVkngudxnqIzpA
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1996 biclient.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1996 biclient.exe 1996 biclient.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2460 wrote to memory of 1996 2460 79a4be9c06f2d6acd0f24adde9488037.exe 88 PID 2460 wrote to memory of 1996 2460 79a4be9c06f2d6acd0f24adde9488037.exe 88 PID 2460 wrote to memory of 1996 2460 79a4be9c06f2d6acd0f24adde9488037.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\79a4be9c06f2d6acd0f24adde9488037.exe"C:\Users\Admin\AppData\Local\Temp\79a4be9c06f2d6acd0f24adde9488037.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\biclient.exe"C:\Users\Admin\AppData\Local\Temp\biclient.exe" /initurl http://bi.bisrv.com/:affid:/:sid:/:uid:? /affid "ffonts" /id "rudiment" /name "Rudiment" /uniqid 79a4be9c06f2d6acd0f24adde94880372⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
219KB
MD5c66293ccd7cbe84b1b8f393ca5e4e6d7
SHA1c24089d407e6280b79bec86532e9de0118e4de71
SHA256ffbae29e2f233767fd42909720497165ce3552427ef93efb2fc714fb4204755f
SHA5127ff97aa71f182035f90ba10c3bf8087280e3f34bf717bda139d642f4e043c64aa2b98d82a90a32f1df4b76f9d7610af62390fe934e514c90c703381a421c00b7
-
Filesize
79B
MD594382c9eb2a230a2d1decc02f145474d
SHA1897c93ad5908cc13d9d8a7afa12b4be5d376de56
SHA2566e5fae72462f715535bebca2278606bdc8195193cb65a025376599e79b7a881f
SHA51277f3cc27dbd8c818846b358e0ecc0c78a98aaa24033fb3af2c0e5e91ccef13ed8e6e1b0bf49fd8d262a79d0bc451066179ead138d7e3662d3254a313b7d07aea