Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 15:35
Static task
static1
Behavioral task
behavioral1
Sample
bc2afff2ed34b879d62615c1d9ccdab7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bc2afff2ed34b879d62615c1d9ccdab7.exe
Resource
win10v2004-20231215-en
General
-
Target
bc2afff2ed34b879d62615c1d9ccdab7.exe
-
Size
2KB
-
MD5
bc2afff2ed34b879d62615c1d9ccdab7
-
SHA1
963109c9e9822b5d846e94b105825252179c354e
-
SHA256
c61c92f7e30a3acdf4e91f4390c59d4733b16a6eee844063af220a4af8369fc2
-
SHA512
c9fdff3255c1dabacef78e3fe0ee5c51903751a6ff524ec048040e854922efe9d83703e7757bc176258e0eef2ec0a3d264123b34ad3142e3262489089725dc6e
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2188 svchst.exe -
Executes dropped EXE 1 IoCs
pid Process 2188 svchst.exe -
Loads dropped DLL 2 IoCs
pid Process 1932 bc2afff2ed34b879d62615c1d9ccdab7.exe 1932 bc2afff2ed34b879d62615c1d9ccdab7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2188 1932 bc2afff2ed34b879d62615c1d9ccdab7.exe 28 PID 1932 wrote to memory of 2188 1932 bc2afff2ed34b879d62615c1d9ccdab7.exe 28 PID 1932 wrote to memory of 2188 1932 bc2afff2ed34b879d62615c1d9ccdab7.exe 28 PID 1932 wrote to memory of 2188 1932 bc2afff2ed34b879d62615c1d9ccdab7.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc2afff2ed34b879d62615c1d9ccdab7.exe"C:\Users\Admin\AppData\Local\Temp\bc2afff2ed34b879d62615c1d9ccdab7.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\svchst.exe"C:\Users\Admin\AppData\Local\Temp\svchst.exe" C:\Users\Admin\AppData\Local\Temp\bc2afff2ed34b879d62615c1d9ccdab7.exe2⤵
- Deletes itself
- Executes dropped EXE
PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5bc2afff2ed34b879d62615c1d9ccdab7
SHA1963109c9e9822b5d846e94b105825252179c354e
SHA256c61c92f7e30a3acdf4e91f4390c59d4733b16a6eee844063af220a4af8369fc2
SHA512c9fdff3255c1dabacef78e3fe0ee5c51903751a6ff524ec048040e854922efe9d83703e7757bc176258e0eef2ec0a3d264123b34ad3142e3262489089725dc6e