Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16-04-2024 01:25
Static task
static1
Behavioral task
behavioral1
Sample
MCBEPlay/bds.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
MCBEPlay/bds.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
MCBEPlay/mcbeplay.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
MCBEPlay/mcbeplay.exe
Resource
win10v2004-20240412-en
General
-
Target
MCBEPlay/bds.exe
-
Size
1.1MB
-
MD5
fb17363726f7014a1ed0bed91a934755
-
SHA1
c43b1066d680d47ddf51098f41fa70695bcb50be
-
SHA256
03cb8b62b0f8dbad03877ff5a2da265d1df64191e37d7773f5fe54f32b267bf2
-
SHA512
7aa17ae7869496d98a58f64ab515fdeee6d40664c4d4f379ffa9a120347df694e86e0997fa43377c84eb18a5689e4d2a5cd04c3df00d31a683242e8a2c9137e5
-
SSDEEP
24576:IRaZROMOm8FN7TjsPnzt2heeRhQbJEOeamWbm2uGQBi:mkxOm+7TjsPnztyDMmahVQ
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe 4652 bds.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD57a50cc93848eb45f2972de7082400ee4
SHA190e814533c7e3782acc5fa3c1831b2cb848067c3
SHA2565f6733cc2e71feea69de448186b76ac072d624e054a0f9af67dd1af41a61b305
SHA51235cc6cd5b47e9b69e5c101f9f9cdd86446351ca8760e19d6142bdf0de29f40d9017ff9a802a5d503f0b03ae16dd5d2e40616b56a9691d3605a1c37f24d81afdd
-
Filesize
4KB
MD542870ca07900c098f59178fa2ea8fbf1
SHA1d635140d213225a53e680464a356286b34b8feb4
SHA256ede91e07ea8fc6c20dedff7d2f9ecb352b04c97055ae1075e2a049e911ab41f6
SHA5124dfdf0d317920a519b776d28e017dd276f7a49ab8954ec8ff11d32c9524303a9e2953bf667d76b3b484d0b26f45bee28a83f786063f84d6ce4832d5688892af7
-
Filesize
12B
MD530ff4eb15654645e6c94c61ca7c74471
SHA131dd07f46f5ee5fc2fa4c5edecde244a0c0ac6ac
SHA2568820e90d8def683903563d1300ccea1c7c0e94c572af1a2622a5310474b42eea
SHA51260f119c2fe2d36b12229c2bd0a253b381343e98d8c5fa827adc813b360cd7134d63543801d4f96b2aa41a391846a08b84bb9f5055a4668af904518612d40561c