Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30-12-2023 21:23

General

  • Target

    1cdc246237fb941660d618cb38d4067e.exe

  • Size

    164KB

  • MD5

    1cdc246237fb941660d618cb38d4067e

  • SHA1

    f0ec3973fa4aa1b9a5fa9085a3f5cbfff78c0fed

  • SHA256

    8e9f59329cdf05422c1b024e9ec1e58abc2b845ebef9d8f674f917544dc171b6

  • SHA512

    58e11b9b49fcb46cdee594ec7cca7c1a477b0e057bba627cde1d947f41ff70cdf7b4707a229ee1bdacef30e18f8461645cfe93e55832237449fd0fb5fd6f80fc

  • SSDEEP

    3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B8M:o68i3odBiTl2+TCU/3

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1cdc246237fb941660d618cb38d4067e.exe
    "C:\Users\Admin\AppData\Local\Temp\1cdc246237fb941660d618cb38d4067e.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2640
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\bugMAKER.bat
      2⤵
        PID:2704

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\bugMAKER.bat

      Filesize

      76B

      MD5

      b9ea7ddaec5f771424b8d828a444207d

      SHA1

      8a8aa5a35bd466675eb4296167ec788f0962ae68

      SHA256

      3af117b84c58c3e2a37f56bc51ccbe5c1452238951a2f38f0a6cfebc9a1a00e2

      SHA512

      08373965ea0a33bc049c85a055cf964abf78d01bf61bdecf96a43524651a017c35df3ebfb924b76e356f9ef74c10e7dece4b95831cd37af28b42164c6be1066a

    • memory/2640-67-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/2704-62-0x00000000022A0000-0x00000000022A1000-memory.dmp

      Filesize

      4KB