Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/12/2023, 10:47

General

  • Target

    8614d2b3b704e88c337430ebad2bdcf1.exe

  • Size

    164KB

  • MD5

    8614d2b3b704e88c337430ebad2bdcf1

  • SHA1

    22c262d80d67e36b19b87ae92e9d5181628d2692

  • SHA256

    4d541a186328dd6fe97762475bdb59b6bb8b3f90aea4efa2ff6bffe6a58b0766

  • SHA512

    a5f883dcb820ddd7654403870c1bafe4136c9f9d361c3c8ddc99752da3efb0d2992014e1ed399c696e62c02fe2ed8c8d510cf3e86dc024b5020db8955edb914a

  • SSDEEP

    3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8x:o68i3odBiTl2+TCU/v

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8614d2b3b704e88c337430ebad2bdcf1.exe
    "C:\Users\Admin\AppData\Local\Temp\8614d2b3b704e88c337430ebad2bdcf1.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1872
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat
      2⤵
      • Checks computer location settings
      • Suspicious use of SetWindowsHookEx
      PID:4928

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\bugMAKER.bat

          Filesize

          76B

          MD5

          6d56db8efc8576a0f4e96bd04f313273

          SHA1

          58ed210cd8b2527630272cc23e5819b04c0c32bd

          SHA256

          f462b531af2b20ca9fc56bf018c064ce0effdfebca7010c12395842178553c07

          SHA512

          560f0c9d2b88359f4c7f5b99cef31bbf7948ba3976ed06c50700bb1fd01b363ac47e186a0ccfff219bad6d0acc6a7c3d0ca712928e52a14a0451d2677c56c8b2

        • memory/1872-24-0x0000000000400000-0x000000000042D000-memory.dmp

          Filesize

          180KB