Analysis

  • max time kernel
    119s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04-01-2024 12:10

General

  • Target

    40d2af967b3afe59eff115b24d1753e5.exe

  • Size

    202KB

  • MD5

    40d2af967b3afe59eff115b24d1753e5

  • SHA1

    2e7b2ab82e199a4be4302091db1b844cd91dd402

  • SHA256

    b04cb415c3d2e04d4671687f3a1f028e6c2e2bd8dccf176db47f15f28e44118d

  • SHA512

    7ce7ed9e2be1db2e45d8950c05797c8fc1007dfa6eaea89aa628a9ea23ce0c7677502f3cd256f9381c31be4ef567bca5286c476e87cccb2409f87090f2a41057

  • SSDEEP

    3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8FpwtkaZgxkz:o68i3odBiTl2+TCU/6tkqz

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\40d2af967b3afe59eff115b24d1753e5.exe
    "C:\Users\Admin\AppData\Local\Temp\40d2af967b3afe59eff115b24d1753e5.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1904
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\bugMAKER.bat
      2⤵
        PID:3008

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\bugMAKER.bat

      Filesize

      76B

      MD5

      8d07c1cb050c05101c30e99445773443

      SHA1

      ca0675f56dfde35ac5b201e42ef60a1c7947e284

      SHA256

      94bc1f3641cac1966f47887800beaddcd0d263b4bdde7b46edc105ba02524e5b

      SHA512

      204712f86446fadb12abc5322ab52e378a15dbac9efc2270ad19c63591c9b69955487e311587c08ed1331f6076c3bf0b7d1ac473cd286008a2b413e0534e86de

    • memory/1904-67-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/3008-62-0x00000000021E0000-0x00000000021E1000-memory.dmp

      Filesize

      4KB