Analysis

  • max time kernel
    163s
  • max time network
    176s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/12/2023, 13:48

General

  • Target

    ae2c65e68cc3fadab97afff6d0d13fd4.exe

  • Size

    175KB

  • MD5

    ae2c65e68cc3fadab97afff6d0d13fd4

  • SHA1

    43dcaa1f78b590ebd26aa1c6ce73b28a54297c86

  • SHA256

    bfe788a6cedb8e4f3c32b5b1da325742bd4fd136cb9c84652b8a41fc1b316d8c

  • SHA512

    8de2a5805bb42c44c36dcde0aa575d9a8435d3bd6324364520c5ea3d7be079c1e8db95c5b974e42d9a3528e269fedd8669cf362feb9712e32787dd5c5209ba9e

  • SSDEEP

    3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8LtkaN:o68i3odBiTl2+TCU/9tks

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae2c65e68cc3fadab97afff6d0d13fd4.exe
    "C:\Users\Admin\AppData\Local\Temp\ae2c65e68cc3fadab97afff6d0d13fd4.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:5076
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat
      2⤵
        PID:2288

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\bugMAKER.bat

            Filesize

            76B

            MD5

            83962617d05b9d5f4dbd6410736bb197

            SHA1

            bbf6c7ea5726ba2250ab56a62f5ac2e1ecdd72ca

            SHA256

            07a9d4ac4b136f63c06e8557a833d3cbea0494939c0dfdc41fa0f0fb41ccf3ba

            SHA512

            e2f426792d00ee1f1bfda2a91483e6c81c454d3a11e90ffe84b7577b23fc5f6d54197ae0b7e4d937fbca9d269e04e7ab1921b43d7b78114909e68129925cf83c

          • memory/5076-24-0x0000000000400000-0x000000000042D000-memory.dmp

            Filesize

            180KB