Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 13:43
Static task
static1
Behavioral task
behavioral1
Sample
bbf3bc64dad9863e7872c4f72a0aa2ec.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bbf3bc64dad9863e7872c4f72a0aa2ec.exe
Resource
win10v2004-20231215-en
General
-
Target
bbf3bc64dad9863e7872c4f72a0aa2ec.exe
-
Size
20KB
-
MD5
bbf3bc64dad9863e7872c4f72a0aa2ec
-
SHA1
0114a95d62abfd61b3ff7f3adabb440c597d2d1f
-
SHA256
6e4060bacd4f83f9086717fb0985b844ed4f588ce4ece1b2c0097657c8405733
-
SHA512
229b09f9d24bf1e21999587139b7079e2c8608a4d390cf46833eee4b4c886cae77117c65be5a5009058457c232e19227a37600334387d225b4f5dbf97f39dffb
-
SSDEEP
384:X53rx5nb2toVsj3PSgpmbX3B0Avn2QzQ7EPFFo7S57Ka:Jrla3qZF0m2wvPgMH
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2692 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 3056 ptssvc.exe 2592 ptssvc.exe -
Loads dropped DLL 3 IoCs
pid Process 2044 bbf3bc64dad9863e7872c4f72a0aa2ec.exe 2044 bbf3bc64dad9863e7872c4f72a0aa2ec.exe 3056 ptssvc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Loader = "C:\\Users\\Admin\\AppData\\Roaming\\ptssvc.exe -lds" bbf3bc64dad9863e7872c4f72a0aa2ec.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2292 set thread context of 2044 2292 bbf3bc64dad9863e7872c4f72a0aa2ec.exe 28 PID 3056 set thread context of 2592 3056 ptssvc.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2044 2292 bbf3bc64dad9863e7872c4f72a0aa2ec.exe 28 PID 2292 wrote to memory of 2044 2292 bbf3bc64dad9863e7872c4f72a0aa2ec.exe 28 PID 2292 wrote to memory of 2044 2292 bbf3bc64dad9863e7872c4f72a0aa2ec.exe 28 PID 2292 wrote to memory of 2044 2292 bbf3bc64dad9863e7872c4f72a0aa2ec.exe 28 PID 2292 wrote to memory of 2044 2292 bbf3bc64dad9863e7872c4f72a0aa2ec.exe 28 PID 2292 wrote to memory of 2044 2292 bbf3bc64dad9863e7872c4f72a0aa2ec.exe 28 PID 2044 wrote to memory of 3056 2044 bbf3bc64dad9863e7872c4f72a0aa2ec.exe 29 PID 2044 wrote to memory of 3056 2044 bbf3bc64dad9863e7872c4f72a0aa2ec.exe 29 PID 2044 wrote to memory of 3056 2044 bbf3bc64dad9863e7872c4f72a0aa2ec.exe 29 PID 2044 wrote to memory of 3056 2044 bbf3bc64dad9863e7872c4f72a0aa2ec.exe 29 PID 3056 wrote to memory of 2592 3056 ptssvc.exe 30 PID 3056 wrote to memory of 2592 3056 ptssvc.exe 30 PID 3056 wrote to memory of 2592 3056 ptssvc.exe 30 PID 3056 wrote to memory of 2592 3056 ptssvc.exe 30 PID 3056 wrote to memory of 2592 3056 ptssvc.exe 30 PID 3056 wrote to memory of 2592 3056 ptssvc.exe 30 PID 2592 wrote to memory of 2692 2592 ptssvc.exe 31 PID 2592 wrote to memory of 2692 2592 ptssvc.exe 31 PID 2592 wrote to memory of 2692 2592 ptssvc.exe 31 PID 2592 wrote to memory of 2692 2592 ptssvc.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbf3bc64dad9863e7872c4f72a0aa2ec.exe"C:\Users\Admin\AppData\Local\Temp\bbf3bc64dad9863e7872c4f72a0aa2ec.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\bbf3bc64dad9863e7872c4f72a0aa2ec.exe"C:\Users\Admin\AppData\Local\Temp\bbf3bc64dad9863e7872c4f72a0aa2ec.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Roaming\ptssvc.exe"C:\Users\Admin\AppData\Roaming\ptssvc.exe" -lds3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Roaming\ptssvc.exe"C:\Users\Admin\AppData\Roaming\ptssvc.exe" -lds4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" firewall add allowedprogram C:\Users\Admin\AppData\Roaming\ptssvc.exe "Windows Update Viewer" ENABLE5⤵
- Modifies Windows Firewall
PID:2692
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5bbf3bc64dad9863e7872c4f72a0aa2ec
SHA10114a95d62abfd61b3ff7f3adabb440c597d2d1f
SHA2566e4060bacd4f83f9086717fb0985b844ed4f588ce4ece1b2c0097657c8405733
SHA512229b09f9d24bf1e21999587139b7079e2c8608a4d390cf46833eee4b4c886cae77117c65be5a5009058457c232e19227a37600334387d225b4f5dbf97f39dffb