Analysis
-
max time kernel
119s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 10:30
Behavioral task
behavioral1
Sample
bce4cf5e303d78c169f38ad8703c203308251f507819ec813cf50144f5df7a31.exe
Resource
win7-20240903-en
General
-
Target
bce4cf5e303d78c169f38ad8703c203308251f507819ec813cf50144f5df7a31.exe
-
Size
285KB
-
MD5
ed3e26661788d803bbf0673eedabc5d7
-
SHA1
a384f32e47cff47733ad14331137623a5b6a9c28
-
SHA256
bce4cf5e303d78c169f38ad8703c203308251f507819ec813cf50144f5df7a31
-
SHA512
e69fb2f45c601672c39230bb3a3c3ccadd691ed3d5fa097ba979dcaec72a2afb45bab46a84bfb593a4f49374a662893c6f13f0d82773b2bf47b727e46ad54665
-
SSDEEP
6144:W1db49+rEg024fpLZazEjvE/rbay19tSt4bO2BaDmeBJe/ZVMXTA:WjkArEN249AyE/rbaMct4bO2/F
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2156 tcpscrex.exe -
Loads dropped DLL 4 IoCs
pid Process 1668 bce4cf5e303d78c169f38ad8703c203308251f507819ec813cf50144f5df7a31.exe 1668 bce4cf5e303d78c169f38ad8703c203308251f507819ec813cf50144f5df7a31.exe 1668 bce4cf5e303d78c169f38ad8703c203308251f507819ec813cf50144f5df7a31.exe 1668 bce4cf5e303d78c169f38ad8703c203308251f507819ec813cf50144f5df7a31.exe -
AutoIT Executable 10 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1668-1-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe behavioral1/memory/1668-23-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe behavioral1/memory/2156-25-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe behavioral1/memory/2156-27-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe behavioral1/memory/2156-28-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe behavioral1/memory/2156-29-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe behavioral1/memory/2156-30-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe behavioral1/memory/2156-31-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe behavioral1/memory/2156-32-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe behavioral1/memory/2156-33-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe -
resource yara_rule behavioral1/memory/1668-0-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/1668-1-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/files/0x000e0000000175d2-7.dat upx behavioral1/memory/1668-23-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2156-22-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2156-25-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2156-27-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2156-28-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2156-29-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2156-30-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2156-31-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2156-32-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2156-33-0x0000000000400000-0x00000000004B4000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Managemenot\Monitor\tcpscrex.exe bce4cf5e303d78c169f38ad8703c203308251f507819ec813cf50144f5df7a31.exe File opened for modification C:\Program Files\Managemenot\Monitor\tcpscrex.exe bce4cf5e303d78c169f38ad8703c203308251f507819ec813cf50144f5df7a31.exe File created C:\Program Files (x86)\Activxr\Rescuer.exe tcpscrex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tcpscrex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bce4cf5e303d78c169f38ad8703c203308251f507819ec813cf50144f5df7a31.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe 2156 tcpscrex.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2156 1668 bce4cf5e303d78c169f38ad8703c203308251f507819ec813cf50144f5df7a31.exe 32 PID 1668 wrote to memory of 2156 1668 bce4cf5e303d78c169f38ad8703c203308251f507819ec813cf50144f5df7a31.exe 32 PID 1668 wrote to memory of 2156 1668 bce4cf5e303d78c169f38ad8703c203308251f507819ec813cf50144f5df7a31.exe 32 PID 1668 wrote to memory of 2156 1668 bce4cf5e303d78c169f38ad8703c203308251f507819ec813cf50144f5df7a31.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\bce4cf5e303d78c169f38ad8703c203308251f507819ec813cf50144f5df7a31.exe"C:\Users\Admin\AppData\Local\Temp\bce4cf5e303d78c169f38ad8703c203308251f507819ec813cf50144f5df7a31.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Program Files\Managemenot\Monitor\tcpscrex.exe"C:\Program Files\Managemenot\Monitor\tcpscrex.exe" 0.0.0.02⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
285KB
MD57560af2f1ba3676b3256c26925cc1446
SHA1b197874c932a0fe501d9955ce4fb45efd2125e35
SHA25697a1cf3023b771c70336ac4c10a5edab98c1242f849b6ba6f5b1141252265c3e
SHA5128f3792c4905cb419ef970928c00767e48dfe222a2eebe3bec7116b8113261846d3e44babc8fd89abe2e7e068245291d36d9f5172dabecd0d9a0fee864394cb67