Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-01-2024 08:11

General

  • Target

    3c57069dafc8c8ebd5fb5c45cd35c386.exe

  • Size

    251KB

  • MD5

    3c57069dafc8c8ebd5fb5c45cd35c386

  • SHA1

    3203dc9ba643f68cd628730d36909501414b4581

  • SHA256

    4e89eed5f37f8ad9fd1befce4222575938ec25cdb592af1979cff5469f1e795e

  • SHA512

    24cd65fd062f502d90178db6f9804fdd3ae1f5c1e1b2c366767380ab006691c94a800ec0a8fae8efa8b182dbb25390a6f09f60825b45af4ff1e4a199ee237122

  • SSDEEP

    3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8oveatQxJtrW:o68i3odBiTl2+TCU/+vePPZtkqxq

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c57069dafc8c8ebd5fb5c45cd35c386.exe
    "C:\Users\Admin\AppData\Local\Temp\3c57069dafc8c8ebd5fb5c45cd35c386.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4620
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat
      2⤵
      • Checks computer location settings
      • Suspicious use of SetWindowsHookEx
      PID:4716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\bugMAKER.bat

    Filesize

    76B

    MD5

    33791c6b936409069dfca4ff610665ad

    SHA1

    7b6899ccdc78bb3e70070af9c57b090ed0b96184

    SHA256

    606825081128805563a9ef4f8c2929b25a5a1ab00162caf4bbc25040b7a0d59f

    SHA512

    4de5f6f2a7827cfee9acd0aab03f781cef5f722f5ecdc4a9fb15e7b63184ee12ff5b110ee6219bd14325e2b3f02ae40ca2b17032a6cf8eacf70a35fad706ac51

  • memory/4620-24-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB