Analysis
-
max time kernel
143s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 18:28
Static task
static1
Behavioral task
behavioral1
Sample
bc7feeb8c4bf7df8322d38670e5256ec.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bc7feeb8c4bf7df8322d38670e5256ec.exe
Resource
win10v2004-20240226-en
General
-
Target
bc7feeb8c4bf7df8322d38670e5256ec.exe
-
Size
933KB
-
MD5
bc7feeb8c4bf7df8322d38670e5256ec
-
SHA1
08ff287680445e62e3fdedacb7299593f7073595
-
SHA256
c18069071b7dd3fb2362713d823b5f3f20b41f23b02b044a4921cc12d6a30f5d
-
SHA512
e141bb571507c836263352eabb5b702a4eef651661a810134081c67fd48ef3741216f64ca5b452332d005ec4c9f0c067e65af4f32bf5730f5fdc762e51d94f87
-
SSDEEP
24576:GgsQqp+kTBx9pCJMyYJ1kqysQwq3oipECeErt3rY:d9MCCTJ1nyBoipEvEpr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2556 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2592 6076655.exe -
Loads dropped DLL 4 IoCs
pid Process 2556 cmd.exe 2556 cmd.exe 2592 6076655.exe 2592 6076655.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\bc7feeb8c4bf7df8322d38670e5256ec = "\"C:\\Users\\Admin\\AppData\\Local\\6076655.exe\" 0 23 " bc7feeb8c4bf7df8322d38670e5256ec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\6076655 = "\"C:\\Users\\Admin\\AppData\\Local\\6076655.exe\" 0 44 " 6076655.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 2108 reg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2592 6076655.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 2592 6076655.exe 2592 6076655.exe 2592 6076655.exe 2592 6076655.exe 2592 6076655.exe 2592 6076655.exe 2592 6076655.exe 2592 6076655.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 2592 6076655.exe 2592 6076655.exe 2592 6076655.exe 2592 6076655.exe 2592 6076655.exe 2592 6076655.exe 2592 6076655.exe 2592 6076655.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2556 2904 bc7feeb8c4bf7df8322d38670e5256ec.exe 28 PID 2904 wrote to memory of 2556 2904 bc7feeb8c4bf7df8322d38670e5256ec.exe 28 PID 2904 wrote to memory of 2556 2904 bc7feeb8c4bf7df8322d38670e5256ec.exe 28 PID 2904 wrote to memory of 2556 2904 bc7feeb8c4bf7df8322d38670e5256ec.exe 28 PID 2556 wrote to memory of 2108 2556 cmd.exe 30 PID 2556 wrote to memory of 2108 2556 cmd.exe 30 PID 2556 wrote to memory of 2108 2556 cmd.exe 30 PID 2556 wrote to memory of 2108 2556 cmd.exe 30 PID 2556 wrote to memory of 2592 2556 cmd.exe 31 PID 2556 wrote to memory of 2592 2556 cmd.exe 31 PID 2556 wrote to memory of 2592 2556 cmd.exe 31 PID 2556 wrote to memory of 2592 2556 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc7feeb8c4bf7df8322d38670e5256ec.exe"C:\Users\Admin\AppData\Local\Temp\bc7feeb8c4bf7df8322d38670e5256ec.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\8668815.bat" "2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\reg.exereg delete HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce /v bc7feeb8c4bf7df8322d38670e5256ec /f3⤵
- Modifies registry key
PID:2108
-
-
C:\Users\Admin\AppData\Local\6076655.exeC:\Users\Admin\AppData\Local\6076655.exe -i3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2592
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5681fee57dbf2f8af129b5192936e456e
SHA1a9de6fae5ce45e91a76e0a48576af1164a996c1b
SHA256be69c751a13517d6cb165496ee4d3c52384c532b5d1267589542e39e028ce9fb
SHA5125e4e4dce74cccd09f275865b4a0fd9b4d688ae88bfebc77e2d4628ef4f779dff52f6d7bd036ec3d3825872ce3dd714f73d2a6df22d4b0e802a2b4a10263e1999
-
Filesize
81KB
MD53caccea56327ab42ff6be5990a6b2fe1
SHA14e941ba34b4813b9ed6d5bb58842770ca2cf6b0f
SHA256e24235e3c9ea11cf4dc5d0e18d3ce99ad4b0f19791dd3ec0ec1b0c267f7e71d8
SHA51204dd3eb7f535cd829d6b0ddc79ee6c1bf99b0e021ce15fa582fe30b619194593ad743b2730a6fe53ad8e88a3bcccf12026794ffd66af5db7b25dd02718f8beb1
-
Filesize
424B
MD5ac084052dad0fc57039c1641237f19da
SHA1790034a29a7a6751576dbedc657c2d161ff5b9b1
SHA25635074017fab970bd2374b50de18bd81574372a6f3194ec37645eb83fd0da6703
SHA51283ff50c7d21cdb4b3166178132e1c0e37c9f6120f8d5f0cfc518b07d83719084075b44ef277b0650678135b87b52942e5c46d952c5b2cded8c1a4cde20a5b8ab
-
Filesize
25KB
MD53eb7958443a99481f079ff4c0c15972f
SHA14eb4b3296c334815c21ea1bef5b221e44c09d81f
SHA256b8d99d9951ad71e2cda7283d51d82353e2140a1a83b78f88721b251ad39d70e6
SHA512274d90c8a684c7c3839424038f2f64cd0a66c09b3606676b2079effa4b70657a48792c16e22fbfb3616aca2a1a4955a3f5c2bf4905fc38eec58ac3d3ca21187e
-
Filesize
42KB
MD5755d270e28ac30d3cc8fa2e167dece6a
SHA1b13feb4b59357357ef9c643e01e1bcf957c74097
SHA256d6ea3b041577c290463fa23361ee257f781ebfe4cb6617693f7f589eef8e3670
SHA512adf176ee7b696a48ef11f828ca52a020d4e47e61f3b6ec9bde8164cf5eb48abed63d679d8774d0169c9cdb8f70c4b541253d089e200b608a2724a5f80e449c41
-
Filesize
862KB
MD5a99097d62e3e9595f2a604375a6e0828
SHA1c9dbfb52c323fe2aedff8f4ac864cc1226f1fdf7
SHA256d349065d50663e977c5a92cd87053e4c6b14ed5534fa97709a169d71d357440b
SHA5124a826f5717c1d032e5c74ad1123ad4ae3ed7f102758a4a1a9a4b82724b620672378e45d255855a142b6ded6672c2e8acb96e4db28c103b276f37c14565772f0d
-
Filesize
933KB
MD5bc7feeb8c4bf7df8322d38670e5256ec
SHA108ff287680445e62e3fdedacb7299593f7073595
SHA256c18069071b7dd3fb2362713d823b5f3f20b41f23b02b044a4921cc12d6a30f5d
SHA512e141bb571507c836263352eabb5b702a4eef651661a810134081c67fd48ef3741216f64ca5b452332d005ec4c9f0c067e65af4f32bf5730f5fdc762e51d94f87