Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-03-2024 20:39
Static task
static1
Behavioral task
behavioral1
Sample
bcc0924bae1c73944071615964aadf08.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bcc0924bae1c73944071615964aadf08.exe
Resource
win10v2004-20240226-en
General
-
Target
bcc0924bae1c73944071615964aadf08.exe
-
Size
3.2MB
-
MD5
bcc0924bae1c73944071615964aadf08
-
SHA1
3929b9462b671446eb7c652594a0a49e33530a4b
-
SHA256
dc2a2843958a9404887888259cec8ad899162c53f4a0dfacbaeb452f551cd180
-
SHA512
c4647b91a5348cd4d902f259b40489e156ecdbd7689e61e008cbc4d84c90c59086fd860304ba792c3ee1065807f836441d92e706750bccb1215aa6651c30fa1b
-
SSDEEP
24576:bSh3WRgI+4sSYXVav9MkqSI8LUlFl5Fp+:VgI+cv9MxcY/+
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" bcc0924bae1c73944071615964aadf08.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\:\autorun.inf bcc0924bae1c73944071615964aadf08.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InkWatson.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe bcc0924bae1c73944071615964aadf08.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCICONS.EXE bcc0924bae1c73944071615964aadf08.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PPTICO.EXE bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe$ bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\native2ascii.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe$ bcc0924bae1c73944071615964aadf08.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe bcc0924bae1c73944071615964aadf08.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ExtExport.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmpenc.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe$ bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jvisualvm.exe$ bcc0924bae1c73944071615964aadf08.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\keytool.exe bcc0924bae1c73944071615964aadf08.exe File created C:\Program Files (x86)\Microsoft Office\Office14\MSOUC.EXE bcc0924bae1c73944071615964aadf08.exe File created C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE bcc0924bae1c73944071615964aadf08.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe bcc0924bae1c73944071615964aadf08.exe File created C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler64.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe$ bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec64.exe$ bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\misc.exe$ bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Wordconv.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe bcc0924bae1c73944071615964aadf08.exe File created C:\Program Files (x86)\Microsoft Office\Office14\MSACCESS.EXE bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmpshare.exe bcc0924bae1c73944071615964aadf08.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files\Java\jre7\bin\rmid.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe$ bcc0924bae1c73944071615964aadf08.exe File created C:\Program Files\Microsoft Games\Solitaire\Solitaire.exe bcc0924bae1c73944071615964aadf08.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\Mahjong.exe$ bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\excelcnv.exe$ bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe bcc0924bae1c73944071615964aadf08.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe bcc0924bae1c73944071615964aadf08.exe File created C:\Program Files (x86)\Common Files\microsoft shared\DW\DWTRIG20.EXE bcc0924bae1c73944071615964aadf08.exe File created C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DW20.EXE$ bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\INFOPATH.EXE$ bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\misc.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe$ bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe bcc0924bae1c73944071615964aadf08.exe File created C:\Program Files\Java\jre7\bin\kinit.exe bcc0924bae1c73944071615964aadf08.exe File created C:\Program Files\Java\jre7\bin\rmiregistry.exe bcc0924bae1c73944071615964aadf08.exe File created C:\Program Files\Microsoft Games\Hearts\Hearts.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOUC.EXE$ bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe bcc0924bae1c73944071615964aadf08.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\VSTOInstaller.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe$ bcc0924bae1c73944071615964aadf08.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32Info.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateBroker.exe$ bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe bcc0924bae1c73944071615964aadf08.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroTextExtractor.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe bcc0924bae1c73944071615964aadf08.exe -
Drops file in Windows directory 33 IoCs
description ioc Process File opened for modification C:\Windows\assembly\GAC_MSIL\ehexthost\6.1.0.0__31bf3856ad364e35\ehexthost.exe bcc0924bae1c73944071615964aadf08.exe File created C:\Windows\assembly\GAC_MSIL\ehexthost\6.1.0.0__31bf3856ad364e35\ehexthost.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Windows\assembly\GAC_MSIL\loadmxf\6.1.0.0__31bf3856ad364e35\loadmxf.exe$ bcc0924bae1c73944071615964aadf08.exe File created C:\Windows\assembly\GAC_MSIL\SMSvcHost\3.0.0.0__b03f5f7f11d50a3a\SMSvcHost.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Windows\assembly\GAC_MSIL\PresentationFontCache\3.0.0.0__31bf3856ad364e35\PresentationFontCache.exe$ bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Windows\assembly\GAC_MSIL\SMSvcHost\3.0.0.0__b03f5f7f11d50a3a\SMSvcHost.exe$ bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Windows\assembly\GAC_64\MSBuild\3.5.0.0__b03f5f7f11d50a3a\MSBuild.exe$ bcc0924bae1c73944071615964aadf08.exe File created C:\Windows\assembly\GAC_64\MSBuild\3.5.0.0__b03f5f7f11d50a3a\MSBuild.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Windows\assembly\GAC_MSIL\ehexthost\6.1.0.0__31bf3856ad364e35\ehexthost.exe$ bcc0924bae1c73944071615964aadf08.exe File created C:\Windows\assembly\GAC_MSIL\Narrator\6.1.0.0__31bf3856ad364e35\Narrator.exe bcc0924bae1c73944071615964aadf08.exe File created C:\Windows\assembly\GAC_32\MSBuild\3.5.0.0__b03f5f7f11d50a3a\MSBuild.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Windows\assembly\GAC_MSIL\PresentationFontCache\3.0.0.0__31bf3856ad364e35\PresentationFontCache.exe bcc0924bae1c73944071615964aadf08.exe File created C:\Windows\assembly\GAC_64\mcupdate\6.1.0.0__31bf3856ad364e35\mcupdate.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Windows\assembly\GAC_MSIL\dfsvc\2.0.0.0__b03f5f7f11d50a3a\dfsvc.exe$ bcc0924bae1c73944071615964aadf08.exe File created C:\Windows\assembly\GAC_MSIL\dfsvc\2.0.0.0__b03f5f7f11d50a3a\dfsvc.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Windows\assembly\GAC_32\ehexthost32\6.1.0.0__31bf3856ad364e35\ehexthost32.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Windows\assembly\GAC_64\mcupdate\6.1.0.0__31bf3856ad364e35\mcupdate.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Windows\assembly\GAC_64\MSBuild\3.5.0.0__b03f5f7f11d50a3a\MSBuild.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Windows\assembly\GAC_MSIL\ComSvcConfig\3.0.0.0__b03f5f7f11d50a3a\ComSvcConfig.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Windows\assembly\GAC_32\ehexthost32\6.1.0.0__31bf3856ad364e35\ehexthost32.exe$ bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Windows\assembly\GAC_32\MSBuild\3.5.0.0__b03f5f7f11d50a3a\MSBuild.exe$ bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Windows\assembly\GAC_MSIL\loadmxf\6.1.0.0__31bf3856ad364e35\loadmxf.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Windows\assembly\GAC_MSIL\SMSvcHost\3.0.0.0__b03f5f7f11d50a3a\SMSvcHost.exe bcc0924bae1c73944071615964aadf08.exe File created C:\Windows\assembly\GAC_MSIL\ComSvcConfig\3.0.0.0__b03f5f7f11d50a3a\ComSvcConfig.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Narrator\6.1.0.0__31bf3856ad364e35\Narrator.exe$ bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Narrator\6.1.0.0__31bf3856ad364e35\Narrator.exe bcc0924bae1c73944071615964aadf08.exe File created C:\Windows\assembly\GAC_MSIL\PresentationFontCache\3.0.0.0__31bf3856ad364e35\PresentationFontCache.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Windows\assembly\GAC_MSIL\dfsvc\2.0.0.0__b03f5f7f11d50a3a\dfsvc.exe bcc0924bae1c73944071615964aadf08.exe File created C:\Windows\assembly\GAC_MSIL\loadmxf\6.1.0.0__31bf3856ad364e35\loadmxf.exe bcc0924bae1c73944071615964aadf08.exe File created C:\Windows\assembly\GAC_32\ehexthost32\6.1.0.0__31bf3856ad364e35\ehexthost32.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Windows\assembly\GAC_32\MSBuild\3.5.0.0__b03f5f7f11d50a3a\MSBuild.exe bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Windows\assembly\GAC_64\mcupdate\6.1.0.0__31bf3856ad364e35\mcupdate.exe$ bcc0924bae1c73944071615964aadf08.exe File opened for modification C:\Windows\assembly\GAC_MSIL\ComSvcConfig\3.0.0.0__b03f5f7f11d50a3a\ComSvcConfig.exe$ bcc0924bae1c73944071615964aadf08.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\:\autorun.inf bcc0924bae1c73944071615964aadf08.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2204 bcc0924bae1c73944071615964aadf08.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcc0924bae1c73944071615964aadf08.exe"C:\Users\Admin\AppData\Local\Temp\bcc0924bae1c73944071615964aadf08.exe"1⤵
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:2204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD51ec151a37052867f9500a511ff52f363
SHA180b844525e6f07f0faf8c3b2e41f390ed5a5205c
SHA256bc551969a3257de16c16c1cb8e3da130fb4096d74637a74dcfe4ec1439367838
SHA5128d467e2d26ff3c581d9e456ad107a6433471f7c299726a1dd81c54c17a4df5ace076147c38369d8ac3bb865b2437d447e94a304a47facf3b3c47cac3dcaee9f0