Overview
overview
7Static
static
3brcdc-win7...up.exe
windows7-x64
7brcdc-win7...up.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3RemoveReg.exe
windows7-x64
1RemoveReg.exe
windows10-2004-x64
1Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3brcdc.sys
windows7-x64
1brcdc.sys
windows10-2004-x64
1dpinst.exe
windows7-x64
4dpinst.exe
windows10-2004-x64
4Analysis
-
max time kernel
118s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 19:58
Static task
static1
Behavioral task
behavioral1
Sample
brcdc-win7_x64-setup.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
brcdc-win7_x64-setup.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
RemoveReg.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
RemoveReg.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
Uninstall.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
Uninstall.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
brcdc.sys
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
brcdc.sys
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
dpinst.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
dpinst.exe
Resource
win10v2004-20240426-en
General
-
Target
Uninstall.exe
-
Size
96KB
-
MD5
627ed5cce5aa4f34c1162f05047bed9c
-
SHA1
8e1a96a2b2347f630e17b67b107e306e95822787
-
SHA256
e57915acf326535b9c41338a4fb91a58c67dbfdf5073adaa62300d2095ca234a
-
SHA512
8fd3e12dca174001aeddec8e2c921c6b28636e937d71496f554f9ff6ed351d30f3fc218220959b452dc75e90bf94b695e067af271a6c06b2fa7ece79fe767e24
-
SSDEEP
1536:+pgpHzb9dZVX9fHMvG0D3XJhgdLeAyNxCCIG5bbEYAMaQdDb8dtok3GJDCXX:EgXdZt9P6D3XJhceAHPYUde4X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2856 Au_.exe -
Loads dropped DLL 2 IoCs
pid Process 2656 Uninstall.exe 2856 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral7/files/0x000a00000001342b-2.dat nsis_installer_1 behavioral7/files/0x000a00000001342b-2.dat nsis_installer_2 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2856 Au_.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2856 2656 Uninstall.exe 28 PID 2656 wrote to memory of 2856 2656 Uninstall.exe 28 PID 2656 wrote to memory of 2856 2656 Uninstall.exe 28 PID 2656 wrote to memory of 2856 2656 Uninstall.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD59384f4007c492d4fa040924f31c00166
SHA1aba37faef30d7c445584c688a0b5638f5db31c7b
SHA25660a964095af1be79f6a99b22212fefe2d16f5a0afd7e707d14394e4143e3f4f5
SHA51268f158887e24302673227adffc688fd3edabf097d7f5410f983e06c6b9c7344ca1d8a45c7fa05553adcc5987993df3a298763477168d4842e554c4eb93b9aaaf
-
Filesize
96KB
MD5627ed5cce5aa4f34c1162f05047bed9c
SHA18e1a96a2b2347f630e17b67b107e306e95822787
SHA256e57915acf326535b9c41338a4fb91a58c67dbfdf5073adaa62300d2095ca234a
SHA5128fd3e12dca174001aeddec8e2c921c6b28636e937d71496f554f9ff6ed351d30f3fc218220959b452dc75e90bf94b695e067af271a6c06b2fa7ece79fe767e24