Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09-03-2024 22:26
Static task
static1
Behavioral task
behavioral1
Sample
bcf6508c93525f64982e3b4437d8bed6.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
bcf6508c93525f64982e3b4437d8bed6.exe
Resource
win10v2004-20240226-en
General
-
Target
bcf6508c93525f64982e3b4437d8bed6.exe
-
Size
905KB
-
MD5
bcf6508c93525f64982e3b4437d8bed6
-
SHA1
96911ba19e384017c768cdf0c586766db9bdd499
-
SHA256
0d58093371dc0f15289d6151a8b81d091c3e77a9b1083bf90a5c37b98fa785b3
-
SHA512
ff8c295027119fe101fb00b7bcb149bc725db627af480960f4e2cce5c2b3cda032f7b7858fe854a778c1923fb457b51f28fbcf9cbabdc4e43407cd68339eab0f
-
SSDEEP
12288:+Plb6kw59HI6FALCEvvBzPUum23oCSIv8SVc0uElXAZC/GS6:+9Gb9HI9LPBs+3oCSIv+ElQYuS6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2272 RAVMOND.EXE -
Loads dropped DLL 2 IoCs
pid Process 1756 bcf6508c93525f64982e3b4437d8bed6.exe 1756 bcf6508c93525f64982e3b4437d8bed6.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\RAVMOND.EXE bcf6508c93525f64982e3b4437d8bed6.exe File opened for modification C:\Windows\SysWOW64\RAVMOND.EXE bcf6508c93525f64982e3b4437d8bed6.exe File opened for modification C:\Windows\SysWOW64\RAVMOND.EXE RAVMOND.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1756 wrote to memory of 2272 1756 bcf6508c93525f64982e3b4437d8bed6.exe 28 PID 1756 wrote to memory of 2272 1756 bcf6508c93525f64982e3b4437d8bed6.exe 28 PID 1756 wrote to memory of 2272 1756 bcf6508c93525f64982e3b4437d8bed6.exe 28 PID 1756 wrote to memory of 2272 1756 bcf6508c93525f64982e3b4437d8bed6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcf6508c93525f64982e3b4437d8bed6.exe"C:\Users\Admin\AppData\Local\Temp\bcf6508c93525f64982e3b4437d8bed6.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\RAVMOND.EXEC:\Windows\system32\RAVMOND.EXE -Service2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2272
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
905KB
MD5bcf6508c93525f64982e3b4437d8bed6
SHA196911ba19e384017c768cdf0c586766db9bdd499
SHA2560d58093371dc0f15289d6151a8b81d091c3e77a9b1083bf90a5c37b98fa785b3
SHA512ff8c295027119fe101fb00b7bcb149bc725db627af480960f4e2cce5c2b3cda032f7b7858fe854a778c1923fb457b51f28fbcf9cbabdc4e43407cd68339eab0f