Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 12:20

General

  • Target

    184e61fe9e1fa64647838f99384013a1.exe

  • Size

    245KB

  • MD5

    184e61fe9e1fa64647838f99384013a1

  • SHA1

    a598cccd9742105e7b4c01927f0e138fcee361fd

  • SHA256

    ef7b6b21e87d57e415ed3c926bda9acda39a2dd2139b8840affc6b9003229a05

  • SHA512

    2c0b3c592012119cfcfff21ebf59f8ac99bacdd120df1acf3183d0bfdfbd92c0dc12304da4753f02138d9f2422cd6a5def4e38f190884f5e3a7508b22d206af1

  • SSDEEP

    3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8KkgnYHfQlAH:o68i3odBiTl2+TCU/Ik8KfQlEe

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\184e61fe9e1fa64647838f99384013a1.exe
    "C:\Users\Admin\AppData\Local\Temp\184e61fe9e1fa64647838f99384013a1.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4712
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat
      2⤵
      • Checks computer location settings
      • Suspicious use of SetWindowsHookEx
      PID:2364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\bugMAKER.bat

    Filesize

    76B

    MD5

    d9ecd331cabdf3bb2256122c512381f2

    SHA1

    0c6cbbc9672df004e0be0d0f7f9604d33d220ee5

    SHA256

    a9672675c92f8cd1623e7cc90996829604dde3bb387f25a397d5cc12fd89c67a

    SHA512

    dec8744bb626cf8b11b2c7eceba54dbf32ea171efd5ba338f852a9dd5479d3b6f5c7a4de390eb07dddfe939da2b7d8c5c4b01d3a1a7f74537a55aa78646d89ec

  • memory/4712-24-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB