Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-01-2024 16:34

General

  • Target

    PuzzleExpress.exe

  • Size

    7.8MB

  • MD5

    5c652cd985a3c449b06ff369a7aa2ee5

  • SHA1

    51d732162926dacb7d602573a475ac3e02995f2f

  • SHA256

    9ea605804702eac64d3ca2a4076e8fc5273fbd5fe4cb98af9dc15c7da65480ba

  • SHA512

    abf8a6888acb065b5a0e6f737aff4a49a810ddd656fd37edce1d070197e84af0fddb68add5eb5cc5688b2c108af6f48e84cfd6300d9facbb182b029f6c8eba02

  • SSDEEP

    98304:kvgk8Bm9TYWWFBrkPa9A/e8MH5YFUCp2ibMIxcVq7nONnmCF7E+MaodY3pS:kgwAFBr4a9SMSFUypcVa2nndoq

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Windows directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PuzzleExpress.exe
    "C:\Users\Admin\AppData\Local\Temp\PuzzleExpress.exe"
    1⤵
    • Checks BIOS information in registry
    • Writes to the Master Boot Record (MBR)
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2944
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x524 0x520
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2944-0-0x0000000000400000-0x0000000000F97000-memory.dmp

    Filesize

    11.6MB