analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
download:

bcs_service.exe

Full analysis: https://app.any.run/tasks/6feb3b0e-8bbc-4ea3-8bbe-a6beff2a660b
Verdict: Malicious activity
Analysis date: April 14, 2019, 20:37:46
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

D5F4E46845AB16D4D8D90AF38C88E0DC

SHA1:

34CD538A1A886E1F875213501D0286873A74648A

SHA256:

563BBF8D20BA1E746D5B7BF8112A6F35113D9A1513CB15882973E92188D59334

SSDEEP:

24576:Ze2coa4RuOyc1teVW63hW1qZUSAL9yJ4PPzOVVYyxommhz9x46LvkZ:JDD061wVW63eqGSukyPgPYBx46Lu

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • bcs.exe (PID: 3068)
      • bcs.exe (PID: 2940)
      • NetQCheckHTML5Agent.exe (PID: 2280)
      • ns2F3.tmp (PID: 2816)
      • ns361.tmp (PID: 3620)
      • ns42E.tmp (PID: 2504)
    • Loads dropped or rewritten executable

      • bcs_service.exe (PID: 3776)
  • SUSPICIOUS

    • Creates files in the program directory

      • bcs_service.exe (PID: 3776)
      • bcs.exe (PID: 2940)
      • NetQCheckHTML5Agent.exe (PID: 2280)
    • Creates a software uninstall entry

      • bcs_service.exe (PID: 3776)
    • Executable content was dropped or overwritten

      • bcs_service.exe (PID: 3776)
    • Starts application with an unusual extension

      • bcs_service.exe (PID: 3776)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: 6
OSVersion: 4
EntryPoint: 0x310f
UninitializedDataSize: 1024
InitializedDataSize: 162816
CodeSize: 24576
LinkerVersion: 6
PEType: PE32
TimeStamp: 2016:07:25 02:55:54+02:00
MachineType: Intel 386 or later, and compatibles

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 25-Jul-2016 00:55:54
Detected languages:
  • English - United States

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000D8

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 25-Jul-2016 00:55:54
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x00005FDD
0x00006000
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.4997
.rdata
0x00007000
0x00001352
0x00001400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.20754
.data
0x00009000
0x000254F8
0x00000600
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.03235
.ndata
0x0002F000
0x0000E000
0x00000000
IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
.rsrc
0x0003D000
0x0004B908
0x0004BA00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
2.72523

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.29551
1065
UNKNOWN
English - United States
RT_MANIFEST
2
2.19191
67624
UNKNOWN
English - United States
RT_ICON
3
2.35632
38056
UNKNOWN
English - United States
RT_ICON
4
2.66859
16936
UNKNOWN
English - United States
RT_ICON
5
7.94915
14327
UNKNOWN
English - United States
RT_ICON
6
2.93843
9640
UNKNOWN
English - United States
RT_ICON
7
3.43723
4264
UNKNOWN
English - United States
RT_ICON
8
3.79825
2440
UNKNOWN
English - United States
RT_ICON
9
4.27938
1128
UNKNOWN
English - United States
RT_ICON
103
3.07075
132
UNKNOWN
English - United States
RT_GROUP_ICON

Imports

ADVAPI32.dll
COMCTL32.dll
GDI32.dll
KERNEL32.dll
SHELL32.dll
USER32.dll
ole32.dll
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
8
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start drop and start drop and start start bcs_service.exe no specs bcs_service.exe ns2f3.tmp no specs ns361.tmp no specs ns42e.tmp no specs bcs.exe no specs bcs.exe no specs netqcheckhtml5agent.exe

Process information

PID
CMD
Path
Indicators
Parent process
3088"C:\Users\admin\AppData\Local\Temp\bcs_service.exe" C:\Users\admin\AppData\Local\Temp\bcs_service.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
3776"C:\Users\admin\AppData\Local\Temp\bcs_service.exe" C:\Users\admin\AppData\Local\Temp\bcs_service.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
2816"C:\Users\admin\AppData\Local\Temp\nsb2E2.tmp\ns2F3.tmp" "C:\Program Files\Visualware BCS\bcs.exe" uninstallC:\Users\admin\AppData\Local\Temp\nsb2E2.tmp\ns2F3.tmpbcs_service.exe
User:
admin
Integrity Level:
HIGH
Exit code:
3221225501
3620"C:\Users\admin\AppData\Local\Temp\nsb2E2.tmp\ns361.tmp" "C:\Program Files\Visualware BCS\bcs_uninstall.exe" /S _?=C:\Program Files\Visualware BCSC:\Users\admin\AppData\Local\Temp\nsb2E2.tmp\ns361.tmpbcs_service.exe
User:
admin
Integrity Level:
HIGH
Exit code:
3221225501
2504"C:\Users\admin\AppData\Local\Temp\nsb2E2.tmp\ns42E.tmp" "C:\Program Files\Visualware BCS\bcs.exe" installC:\Users\admin\AppData\Local\Temp\nsb2E2.tmp\ns42E.tmpbcs_service.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
3068"C:\Program Files\Visualware BCS\bcs.exe" installC:\Program Files\Visualware BCS\bcs.exens42E.tmp
User:
admin
Integrity Level:
HIGH
Exit code:
0
2940"C:\Program Files\Visualware BCS\bcs.exe"C:\Program Files\Visualware BCS\bcs.exeservices.exe
User:
SYSTEM
Integrity Level:
SYSTEM
2280"C:\Program Files\Visualware BCS\NetQCheckHTML5Agent.exe" managedC:\Program Files\Visualware BCS\NetQCheckHTML5Agent.exe
bcs.exe
User:
SYSTEM
Integrity Level:
SYSTEM
Total events
349
Read events
344
Write events
5
Delete events
0

Modification events

(PID) Process:(3776) bcs_service.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Visualware BCS
Operation:writeName:InstallDir
Value:
C:\Program Files\Visualware BCS
(PID) Process:(3776) bcs_service.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Visualware BCS
Operation:writeName:DisplayName
Value:
Visualware BCS
(PID) Process:(3776) bcs_service.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Visualware BCS
Operation:writeName:UninstallString
Value:
"C:\Program Files\Visualware BCS\bcs_uninstall.exe"
(PID) Process:(3776) bcs_service.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Visualware BCS
Operation:writeName:NoModify
Value:
1
(PID) Process:(3776) bcs_service.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Visualware BCS
Operation:writeName:NoRepair
Value:
1
Executable files
8
Suspicious files
1
Text files
21
Unknown types
0

Dropped files

PID
Process
Filename
Type
3776bcs_service.exeC:\Users\admin\AppData\Local\Temp\nsb2E2.tmp\ns2F3.tmp
MD5:
SHA256:
3776bcs_service.exeC:\Users\admin\AppData\Local\Temp\nsb2E2.tmp\ns361.tmp
MD5:
SHA256:
3776bcs_service.exeC:\Program Files\Visualware BCS\bcshome.urltext
MD5:37FFEDFD5D69AEA210788EB68B5D9BAA
SHA256:CF004D7D50EC6699933EA3C9C84D8AB57CC907867A03D60309C17604B9F93C78
3776bcs_service.exeC:\Program Files\Visualware BCS\favicon.icoimage
MD5:078538105B7766F8A63D2BC3B438703A
SHA256:6BFE68E0F180C942D121AB35A17B0B671EF219EBC34D95E2F68DAC000E94FB9C
3776bcs_service.exeC:\Program Files\Visualware BCS\bcs_uninstall.exeexecutable
MD5:F4F1415757ADC7504066094D793B603B
SHA256:DF4FD14255354524CB96F3CB12B73623063EB55DA3E486C3CA44AE8F9433D0F0
3776bcs_service.exeC:\Program Files\Visualware BCS\bcsicon.icoimage
MD5:078538105B7766F8A63D2BC3B438703A
SHA256:6BFE68E0F180C942D121AB35A17B0B671EF219EBC34D95E2F68DAC000E94FB9C
3776bcs_service.exeC:\Program Files\Visualware BCS\NetQCheckHTML5Agent.exeexecutable
MD5:1DCF04B9318DF6737FAC4BCFB62D281B
SHA256:1A5E9FA5350CC221AC0C10653062468D8B8ED229D3FB0CF3ED407A096241811E
3776bcs_service.exeC:\Program Files\Visualware BCS\thebcs.exeexecutable
MD5:1DCF04B9318DF6737FAC4BCFB62D281B
SHA256:1A5E9FA5350CC221AC0C10653062468D8B8ED229D3FB0CF3ED407A096241811E
3776bcs_service.exeC:\Program Files\Visualware BCS\license.rtftext
MD5:BEB84C5239D2D553DFC122AB9265A17C
SHA256:F3448723722C30DB499C1CEFA02008DD6486A9372919AC08D6A27465D5607841
2280NetQCheckHTML5Agent.exeC:\Program Files\Visualware BCS\AppUpdaterLog.txttext
MD5:77E3122B92F853F0299304B6D157D713
SHA256:21455831A8BE525E0F7A4CF3ACCA85F7B5A61E619C66B7684DC0340C06AD66DF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
1
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2280
NetQCheckHTML5Agent.exe
GET
200
38.100.141.76:80
http://updatebcs.visualware.com/appupdates/NetQCheckHTML5Agent/windows/version.txt
US
text
60 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2280
NetQCheckHTML5Agent.exe
38.100.141.76:80
updatebcs.visualware.com
Cogent Communications
US
suspicious

DNS requests

Domain
IP
Reputation
updatebcs.visualware.com
  • 38.100.141.76
malicious

Threats

PID
Process
Class
Message
2280
NetQCheckHTML5Agent.exe
A Network Trojan was detected
ET INFO Suspicious Mozilla User-Agent - Likely Fake (Mozilla/4.0)
No debug info