Analysis

  • max time kernel
    120s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 10:13

General

  • Target

    1587d19f5c42de9e2e05a5125c9f623e.exe

  • Size

    218KB

  • MD5

    1587d19f5c42de9e2e05a5125c9f623e

  • SHA1

    86604fc11d08ee2b9178ba8b7008c1163b835832

  • SHA256

    24e25023541fe76fba0ecb1a4faf846eac1cd6da183ac6383338c107969a7072

  • SHA512

    bdaa1bb1c84ae18458cc2d1faf017fba13c34cb027507edef2ce16d6595e9eaad0be47bb42db8e32b67c17858d4f46fc095eb5fe3dfe485f7b082bc014d4819c

  • SSDEEP

    3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B8Ltka7pj0kgP:o68i3odBiTl2+TCU/ytkG0k8P

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1587d19f5c42de9e2e05a5125c9f623e.exe
    "C:\Users\Admin\AppData\Local\Temp\1587d19f5c42de9e2e05a5125c9f623e.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2332
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\bugMAKER.bat
      2⤵
        PID:2844

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\bugMAKER.bat

            Filesize

            76B

            MD5

            0fa1d12f55e06a556c082d481fb94d6c

            SHA1

            95d703b895ab736bf0bbd09978b9d81673353779

            SHA256

            8d38bc66c8066e4fff0577a4bb8249a7e999fea89c6d6596513dae76668cdb0f

            SHA512

            22af528f9ccff6f070e467dd879e49e286cf3dc72174cb5eb7abb988edaccacb5861cfa7ca47fd57bd2e9fd53c4ca145d1e26950be05b6b480441f9f21fa3056

          • memory/2332-67-0x0000000000400000-0x000000000042D000-memory.dmp

            Filesize

            180KB

          • memory/2844-62-0x0000000002360000-0x0000000002361000-memory.dmp

            Filesize

            4KB