Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-01-2024 15:03

General

  • Target

    56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe

  • Size

    227KB

  • MD5

    56c7c8dbb0eb3a743a96bc2b4ccbccd6

  • SHA1

    98da4979bebfcbd7212db25f857e21947aa49ba5

  • SHA256

    1246d67d866b350856f273187beaf829b6bcba477e7e4302b89cb16ae5fc5299

  • SHA512

    ccedab420d4d625c17c0f28d9cc52a5df62091eda3bc18683f6be36cd731541f5aba3886e7ca356a6ca7b05e818d668800777b0a7b973530f7680977d3dea1bd

  • SSDEEP

    3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8FpSkgnYEkgJ:o68i3odBiTl2+TCU/4k8nkM

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe
    "C:\Users\Admin\AppData\Local\Temp\56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4240
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat
      2⤵
      • Checks computer location settings
      • Suspicious use of SetWindowsHookEx
      PID:3428

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\bugMAKER.bat

    Filesize

    76B

    MD5

    58427bf50a517286de9014d3c49edf24

    SHA1

    d05349924e62f3d19cee92b75dc1031cbb39755d

    SHA256

    589cceb08ae9a4064c2946470d50f56af073aa2535a37a293f81978000a1eef4

    SHA512

    6b765a34dd5aac9a19c0cc347b41e6e45b0f31f69a906be175e0f19827503568a14ab5a9f5aa2cf22c6709750b0ec41512d731ac30a4b101587ecb760e9e8d27

  • memory/4240-24-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB