Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09-03-2024 22:12
Static task
static1
Behavioral task
behavioral1
Sample
bcee4702f35994eb8cf906876a26f77c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bcee4702f35994eb8cf906876a26f77c.exe
Resource
win10v2004-20231215-en
General
-
Target
bcee4702f35994eb8cf906876a26f77c.exe
-
Size
9KB
-
MD5
bcee4702f35994eb8cf906876a26f77c
-
SHA1
a28ebe6c97d37dc961f94d2f2493a62bbd5f735a
-
SHA256
c954ca3d7e795d323b1d79a7032f6e3db74bd8c0d458299acdc3d6357e65af20
-
SHA512
fd0c7fce86a1020aa929c830cb28108d2680e653116ce1e522f811eb20a517b7f359a6f7a82732cdba2c3066ffffa9175f6cd86cdceeab3127f12156186d3ad6
-
SSDEEP
192:4DvrTYiNbLr8YiJuht4bI0dUO2Jt3BU27wNUoynV:Gfx8YiK4bKJtG27war
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run lncom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Windows Reg Services = "C:\\Windows\\system32\\ffservice.exe" lncom.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{a75aed00-d7bf-11d1-9947-00c0Cf98bbc9}\StubPath = "C:\\Windows\\system32\\lservice.exe" lncom.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{a75aed00-d7bf-11d1-9947-00c0Cf98bbc9} lncom.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation bcee4702f35994eb8cf906876a26f77c.exe -
Executes dropped EXE 2 IoCs
pid Process 640 lncom.exe 2404 wservice.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Reg Services = "C:\\Windows\\system32\\ffservice.exe" lncom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Reg Services = "C:\\Windows\\system32\\ffservice.exe" lncom.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\wservice.exe lncom.exe File opened for modification C:\Windows\SysWOW64\wservice.exe lncom.exe File created C:\Windows\SysWOW64\lservice.exe lncom.exe File opened for modification C:\Windows\SysWOW64\lservice.exe lncom.exe File created C:\Windows\SysWOW64\ffservice.exe lncom.exe File opened for modification C:\Windows\SysWOW64\ffservice.exe lncom.exe File created C:\Windows\SysWOW64\lncom.exe bcee4702f35994eb8cf906876a26f77c.exe File created C:\Windows\SysWOW64\lncom_.ram bcee4702f35994eb8cf906876a26f77c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings bcee4702f35994eb8cf906876a26f77c.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4896 vlc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 640 lncom.exe 640 lncom.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4896 vlc.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4896 vlc.exe 4896 vlc.exe 4896 vlc.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4896 vlc.exe 4896 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4896 vlc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1180 wrote to memory of 4896 1180 bcee4702f35994eb8cf906876a26f77c.exe 85 PID 1180 wrote to memory of 4896 1180 bcee4702f35994eb8cf906876a26f77c.exe 85 PID 1180 wrote to memory of 640 1180 bcee4702f35994eb8cf906876a26f77c.exe 86 PID 1180 wrote to memory of 640 1180 bcee4702f35994eb8cf906876a26f77c.exe 86 PID 1180 wrote to memory of 640 1180 bcee4702f35994eb8cf906876a26f77c.exe 86 PID 1180 wrote to memory of 3580 1180 bcee4702f35994eb8cf906876a26f77c.exe 87 PID 1180 wrote to memory of 3580 1180 bcee4702f35994eb8cf906876a26f77c.exe 87 PID 1180 wrote to memory of 3580 1180 bcee4702f35994eb8cf906876a26f77c.exe 87 PID 640 wrote to memory of 2404 640 lncom.exe 89 PID 640 wrote to memory of 2404 640 lncom.exe 89 PID 640 wrote to memory of 2404 640 lncom.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcee4702f35994eb8cf906876a26f77c.exe"C:\Users\Admin\AppData\Local\Temp\bcee4702f35994eb8cf906876a26f77c.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Windows\system32\lncom_.ram"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4896
-
-
C:\Windows\SysWOW64\lncom.exe"C:\Windows\system32\lncom.exe"2⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\wservice.exeC:\Windows\system32\wservice.exe -s3⤵
- Executes dropped EXE
PID:2404
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\BCEE47~1.EXE.bat2⤵PID:3580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133B
MD56cc58f9dad714d70916c3504afd56fc5
SHA115ccbc6d5d1cbf9937ada2231784bee681685c04
SHA2568191f7e3b4776511c9d5025ac3b96a6d9ce4db1b3b9f170c7d4b2db964102f59
SHA512b0a708058a5d0dff018223a5dd49365e22213b0ac552a134e86783f07dc988fc89092dc1f94122fcc1d411c275c36c784543f36675e737ee54132b69f7e350a2
-
Filesize
114B
MD513c8bd6f1852f9a055d29f64d97ad585
SHA1bfee3efd58e6ce092f8ba70143a1bf12ac974d33
SHA256c7c10e960a6a8a0c08b5492ef93efd72427eae1c173345746ed011e87b589f2c
SHA51224ceccf5aff93c2e82d882d8bc360287e74d220a350fee388e9a16f9622f06dd705f38632e5819664ce2c0dc1d5468b0ad208e5221e510ee4751c7b9457f7944
-
Filesize
5KB
MD5ca6dcb0152df4a9fe0271f65b3033298
SHA151d7877d5e514d5b9085cb4991fd37e9edd93f18
SHA2566e127ca0c32641a7098fa16dc34a1423942f17aab897c2e75a719ee9f46b0aad
SHA512b7409982483d361dcb21257cde3ab038c2dc2c982ca6d329c4582147237e6cb8f19ffa9ff6d1b3ceec4bed73d48864010c17e0036cbc6332bda42dec3fcd7360