Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/01/2024, 19:32

General

  • Target

    75556eae945cfeae21a57660316b4608.exe

  • Size

    180KB

  • MD5

    75556eae945cfeae21a57660316b4608

  • SHA1

    43d246b7f6d1ef85f0fad773e958b48ecb3b6834

  • SHA256

    1338f2082011323c7a4961ef066986f99007a6a8f87a9f8a12a2ee645854eec1

  • SHA512

    b28a11c57f5a9ecf41dd7ee8776549c88cd121b2939022a4a74cfe40a124fdf314a2efe2c8ffb73ece42f729b711dbb0aa32ed133720c284957e648d7f7b7e6c

  • SSDEEP

    3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B8rkgnu:o68i3odBiTl2+TCU/8k8u

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\75556eae945cfeae21a57660316b4608.exe
    "C:\Users\Admin\AppData\Local\Temp\75556eae945cfeae21a57660316b4608.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\bugMAKER.bat
      2⤵
        PID:2140

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\bugMAKER.bat

      Filesize

      76B

      MD5

      f183e7c2ea8a129815cd089b00299c88

      SHA1

      a96423cf92b663f7ab237a2deb3004a5f15c690c

      SHA256

      541249d27eeae6fce64f621d6e1037e57d2694583d71aad9c13a96b665dc0e5e

      SHA512

      fdaa00e58fa49d3932848150f35361978c92baf05ca10334756b36941606ef4aae717370127111fcf4ed4d6c3cc97da535c18de0ea7ab5d7882f74504a90f0a5

    • memory/2140-62-0x0000000002590000-0x0000000002591000-memory.dmp

      Filesize

      4KB

    • memory/2256-67-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB