Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 23:25
Static task
static1
Behavioral task
behavioral1
Sample
87254e49969b773937f04a43e552ad78651aba70db47353e5d9205d4e4ff0f03.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
87254e49969b773937f04a43e552ad78651aba70db47353e5d9205d4e4ff0f03.exe
Resource
win10v2004-20240508-en
General
-
Target
87254e49969b773937f04a43e552ad78651aba70db47353e5d9205d4e4ff0f03.exe
-
Size
4KB
-
MD5
3db78f3c87c58b1429da9db1a898504c
-
SHA1
8caf1e668705d43b6a57bab6ff07cf539d3d13fc
-
SHA256
87254e49969b773937f04a43e552ad78651aba70db47353e5d9205d4e4ff0f03
-
SHA512
03f938b8384239866b557e2a0e5a5847ee53b3a5e76b3a3c41c11a76b55e90e72b7a7eef1bfff0467b50a3e0477262e0ef8564d936698d8ff3aff2c2db920d1a
-
SSDEEP
48:Z1Xiz8HKR20fOO6Vrond2vyFSu8x9qBtB2nApmwGLjUxTYbCepb6s29YWvqBWOk2:ZBQ3j6cInZqPwnumwC4sbCNYlaxY/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2364 bvvcb.exe -
Loads dropped DLL 2 IoCs
pid Process 2232 87254e49969b773937f04a43e552ad78651aba70db47353e5d9205d4e4ff0f03.exe 2232 87254e49969b773937f04a43e552ad78651aba70db47353e5d9205d4e4ff0f03.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2364 2232 87254e49969b773937f04a43e552ad78651aba70db47353e5d9205d4e4ff0f03.exe 28 PID 2232 wrote to memory of 2364 2232 87254e49969b773937f04a43e552ad78651aba70db47353e5d9205d4e4ff0f03.exe 28 PID 2232 wrote to memory of 2364 2232 87254e49969b773937f04a43e552ad78651aba70db47353e5d9205d4e4ff0f03.exe 28 PID 2232 wrote to memory of 2364 2232 87254e49969b773937f04a43e552ad78651aba70db47353e5d9205d4e4ff0f03.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\87254e49969b773937f04a43e552ad78651aba70db47353e5d9205d4e4ff0f03.exe"C:\Users\Admin\AppData\Local\Temp\87254e49969b773937f04a43e552ad78651aba70db47353e5d9205d4e4ff0f03.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\bvvcb.exe"C:\Users\Admin\AppData\Local\Temp\bvvcb.exe"2⤵
- Executes dropped EXE
PID:2364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5c1bdffe5a52f599522dbd01c57821091
SHA1868e3d4f15a63c2b906ad63291137c8852e7f9f8
SHA2561acc9500625818ef25de02c6c4c384f1a4145c9eb2b1c68b3dd2e857f3536419
SHA51269a9e691fed1218c3d5c7cc6adfc32cf0e9846cb6a799a5eb9a05f0f0d9042a1a5cfa5bac19ec4a78d6a104bbf6ef74cfdb6e97077cafc183c6b569bc1e8324a