Analysis
-
max time kernel
91s -
max time network
101s -
platform
windows11-21h2_x64 -
resource
win11-20240704-en -
resource tags
arch:x64arch:x86image:win11-20240704-enlocale:en-usos:windows11-21h2-x64system -
submitted
04-07-2024 20:43
Static task
static1
Behavioral task
behavioral1
Sample
b4c8cabdb454ad0855960445ebd98b9b7b5fab255c62a36d5b34ae575ccee0f2.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral2
Sample
b4c8cabdb454ad0855960445ebd98b9b7b5fab255c62a36d5b34ae575ccee0f2.exe
Resource
win11-20240704-en
General
-
Target
b4c8cabdb454ad0855960445ebd98b9b7b5fab255c62a36d5b34ae575ccee0f2.exe
-
Size
4.7MB
-
MD5
9635389d4492a1bb338d7467cc79a84f
-
SHA1
5bf4e06b683c07b6b59da041bc81fdc0e2accf5c
-
SHA256
b4c8cabdb454ad0855960445ebd98b9b7b5fab255c62a36d5b34ae575ccee0f2
-
SHA512
106e536e589a4f76176ea5ecb564f46b6f6d1dda2bf33431fff682a3b2ef8fd4df11b6101118f52e14bb46ea2469697ac5738be07fc97fae28c7ec41dbaa5508
-
SSDEEP
49152:ZadqSJa0AzAku0pfKEae72f9tMcf3gBXkjV5Eh/GRJcwq7lSv5TG11kA:IbJa0AFjk5E8a1D
Malware Config
Signatures
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
b4c8cabdb454ad0855960445ebd98b9b7b5fab255c62a36d5b34ae575ccee0f2.exedescription pid process target process PID 5016 set thread context of 2960 5016 b4c8cabdb454ad0855960445ebd98b9b7b5fab255c62a36d5b34ae575ccee0f2.exe BitLockerToGo.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
BitLockerToGo.exepid process 2960 BitLockerToGo.exe 2960 BitLockerToGo.exe 2960 BitLockerToGo.exe 2960 BitLockerToGo.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
b4c8cabdb454ad0855960445ebd98b9b7b5fab255c62a36d5b34ae575ccee0f2.exedescription pid process target process PID 5016 wrote to memory of 2960 5016 b4c8cabdb454ad0855960445ebd98b9b7b5fab255c62a36d5b34ae575ccee0f2.exe BitLockerToGo.exe PID 5016 wrote to memory of 2960 5016 b4c8cabdb454ad0855960445ebd98b9b7b5fab255c62a36d5b34ae575ccee0f2.exe BitLockerToGo.exe PID 5016 wrote to memory of 2960 5016 b4c8cabdb454ad0855960445ebd98b9b7b5fab255c62a36d5b34ae575ccee0f2.exe BitLockerToGo.exe PID 5016 wrote to memory of 2960 5016 b4c8cabdb454ad0855960445ebd98b9b7b5fab255c62a36d5b34ae575ccee0f2.exe BitLockerToGo.exe PID 5016 wrote to memory of 2960 5016 b4c8cabdb454ad0855960445ebd98b9b7b5fab255c62a36d5b34ae575ccee0f2.exe BitLockerToGo.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4c8cabdb454ad0855960445ebd98b9b7b5fab255c62a36d5b34ae575ccee0f2.exe"C:\Users\Admin\AppData\Local\Temp\b4c8cabdb454ad0855960445ebd98b9b7b5fab255c62a36d5b34ae575ccee0f2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2960