Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 15:15
Static task
static1
Behavioral task
behavioral1
Sample
bcdd8b7c9ec736765d4596332c0fec1334b035d4456df1ec25b569f9b6431a23.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bcdd8b7c9ec736765d4596332c0fec1334b035d4456df1ec25b569f9b6431a23.exe
Resource
win10v2004-20241007-en
General
-
Target
bcdd8b7c9ec736765d4596332c0fec1334b035d4456df1ec25b569f9b6431a23.exe
-
Size
10.7MB
-
MD5
6898eace70e2da82f257bc78cb081b2f
-
SHA1
5ac5ed21436d8b4c59c0b62836d531844c571d6d
-
SHA256
bcdd8b7c9ec736765d4596332c0fec1334b035d4456df1ec25b569f9b6431a23
-
SHA512
ca719707417a095fe092837e870aefc7e8874ef351e27b5b41e40f46a9e2f6cb2ba915858bc3c99a14c2f1288c71c7ddd9c2adee6588d6b43cd3ba276e1585d2
-
SSDEEP
196608:EXJw5XZ54Gu3tLvKixbJ5qtWwgbBnNUm1ae30eL3h8g3SGXm4iF+gPa:Gy3RCBKixdoYwgNNp1IeSQSGWpFj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1208 stub.exe -
Loads dropped DLL 2 IoCs
pid Process 2232 bcdd8b7c9ec736765d4596332c0fec1334b035d4456df1ec25b569f9b6431a23.exe 1208 stub.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2232 wrote to memory of 1208 2232 bcdd8b7c9ec736765d4596332c0fec1334b035d4456df1ec25b569f9b6431a23.exe 31 PID 2232 wrote to memory of 1208 2232 bcdd8b7c9ec736765d4596332c0fec1334b035d4456df1ec25b569f9b6431a23.exe 31 PID 2232 wrote to memory of 1208 2232 bcdd8b7c9ec736765d4596332c0fec1334b035d4456df1ec25b569f9b6431a23.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcdd8b7c9ec736765d4596332c0fec1334b035d4456df1ec25b569f9b6431a23.exe"C:\Users\Admin\AppData\Local\Temp\bcdd8b7c9ec736765d4596332c0fec1334b035d4456df1ec25b569f9b6431a23.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\onefile_2232_133788357333440000\stub.exeC:\Users\Admin\AppData\Local\Temp\bcdd8b7c9ec736765d4596332c0fec1334b035d4456df1ec25b569f9b6431a23.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16.1MB
MD5d09a400f60c7a298e884f90539e9c72f
SHA141582ba130bef907e24f87534e7a0fdd37025101
SHA256700962aa295e2fa207ff522e2f5ca051a2929eb6f252d42c9cb0a56a4f084bfe
SHA512d8ba2859bb2ea109c1ca33cb924e40bf61db79aefb59324101d9f47a08835d86834790d3bc6bad4151a561ef82265b32d5111bc80f95dce769c5eb4da5116cc9
-
Filesize
4.3MB
MD5c80b5cb43e5fe7948c3562c1fff1254e
SHA1f73cb1fb9445c96ecd56b984a1822e502e71ab9d
SHA256058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20
SHA512faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81