Analysis
-
max time kernel
118s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 14:53
Static task
static1
Behavioral task
behavioral1
Sample
bc1504586991e3d5a78bc29b7fd5e4ea.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bc1504586991e3d5a78bc29b7fd5e4ea.exe
Resource
win10v2004-20240226-en
General
-
Target
bc1504586991e3d5a78bc29b7fd5e4ea.exe
-
Size
1.9MB
-
MD5
bc1504586991e3d5a78bc29b7fd5e4ea
-
SHA1
de88dbff8d019781c4639f8863ece49bea2c28d0
-
SHA256
e3405c06a77fc1de6f9118a243cb26ec0682c6a235c9ab9d74e4a2ce27592823
-
SHA512
2b1014644015e3f47a8c4ad047de049063d02de24c6899a9cf08625d7a88f815ca3c14f394d9da11333f6b156ac557864e2e22c3510cceda48d1688c6e807cbe
-
SSDEEP
49152:Qoa1taC070dSmveZxMA/g7KvkiA9OGMKpBekA8fWnYJkj:Qoa1taC0QvYxMAUVgoik9+nn
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2928 B52C.tmp -
Executes dropped EXE 1 IoCs
pid Process 2928 B52C.tmp -
Loads dropped DLL 1 IoCs
pid Process 2748 bc1504586991e3d5a78bc29b7fd5e4ea.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2928 2748 bc1504586991e3d5a78bc29b7fd5e4ea.exe 27 PID 2748 wrote to memory of 2928 2748 bc1504586991e3d5a78bc29b7fd5e4ea.exe 27 PID 2748 wrote to memory of 2928 2748 bc1504586991e3d5a78bc29b7fd5e4ea.exe 27 PID 2748 wrote to memory of 2928 2748 bc1504586991e3d5a78bc29b7fd5e4ea.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc1504586991e3d5a78bc29b7fd5e4ea.exe"C:\Users\Admin\AppData\Local\Temp\bc1504586991e3d5a78bc29b7fd5e4ea.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\B52C.tmp"C:\Users\Admin\AppData\Local\Temp\B52C.tmp" --splashC:\Users\Admin\AppData\Local\Temp\bc1504586991e3d5a78bc29b7fd5e4ea.exe 35B9E3012577DABEA5EFA95EE0BF22B368863FA21B42FDE35A49D82B098BCDA2FF7034DC610F565A092F1D73A14DD119DC901820BE13E8D8349BE59160A582D62⤵
- Deletes itself
- Executes dropped EXE
PID:2928
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD556b4cbeee8855ffd13442a7a5fa84792
SHA1ff33e96d3e05f023b7420164d2f7d8c155bc25b4
SHA2564af29c3334a0172290774b770c781f28afb0f578a203d2688893af49d27d0555
SHA512b351741546d598b8a9009e7eb9b3061154a7df8dbfefcbb5857649d8ef25012c860d91fdca1b07d52da97fb0cea6bae52d083748410ef3430ab188ea0b0cf6bd