Analysis

  • max time kernel
    136s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2023 13:27

General

  • Target

    32d76f4b52af21b2bd990d5ce322bba0.exe

  • Size

    168KB

  • MD5

    32d76f4b52af21b2bd990d5ce322bba0

  • SHA1

    0ffdeb45c94af2709ddd48c0e40723c2883c4407

  • SHA256

    3faddbbae6cd5f7709d765b07c158b18d067124c099c325ab567adde14f8c33e

  • SHA512

    33b844ec100375bd3c1fface1266d2955a86096db17c42505fe0a609cd5eb0644a299d3f0f120e184732589c98c65ab5bd1943dbc351925305869d23237f1cb2

  • SSDEEP

    3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/k8h:o68i3odBiTl2+TCU/B

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\32d76f4b52af21b2bd990d5ce322bba0.exe
    "C:\Users\Admin\AppData\Local\Temp\32d76f4b52af21b2bd990d5ce322bba0.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:3812
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat
      2⤵
      • Checks computer location settings
      • Suspicious use of SetWindowsHookEx
      PID:4612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\bugMAKER.bat

    Filesize

    76B

    MD5

    1daecfa71bc0228dd9afdcce9ef4df1c

    SHA1

    ca2d7c55e77a18a2a2fee7e5364cebfc96e02c06

    SHA256

    7dc2af1205c685126f5d90d1a945787ffed7e498e94f9004a4c60941f089be75

    SHA512

    42da0e5251984e8fad0ec7cf80eb3c334378356e1be46b2457392698d17bfee524e14c44f42b75008038b1739c12ea5b6a357f9ae0b9f60e54e9076a98d1b9b4

  • memory/3812-24-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB