Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/01/2024, 21:52

General

  • Target

    787b16aff87a8ac4520d26aab49ceb2f.exe

  • Size

    200KB

  • MD5

    787b16aff87a8ac4520d26aab49ceb2f

  • SHA1

    270428ba8ffc05e0eae6c552db2d5289a75c53c2

  • SHA256

    b8d6d51221f999c9d2362ded7e765e582032caf319136cb65f2ce5350e9ca3bf

  • SHA512

    c5efdebb525ce8eac2810107959646da4cd926db99e6cdadb6e9a9b4d1558f176a1cf85817912e3fe6d87eab6fb5b7581890822742b073261a932af48f0dc3b4

  • SSDEEP

    3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/g8spjBFy11Aw6:o68i3odBiTl2+TCU/ahuhuIpw

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\787b16aff87a8ac4520d26aab49ceb2f.exe
    "C:\Users\Admin\AppData\Local\Temp\787b16aff87a8ac4520d26aab49ceb2f.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1560
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat
      2⤵
      • Checks computer location settings
      PID:3192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\bugMAKER.bat

    Filesize

    76B

    MD5

    921c86d3c47c8ae80481a0e1b8636ab8

    SHA1

    81cca2b02d32158713008437ff49378a05fc9888

    SHA256

    f712f4e3ead1d5b85ca191f38dba0b0d60bd8f9f696f77a93ca5123dfbb86bbe

    SHA512

    96029715cbba22c3f81792a7a9565add61f130c68bdf93f3be069b03dfa77f984a500750c06baf89afebdf9b8d9edaa4cd37c6b28e6db5df58bbf72dcc25bba8

  • memory/1560-24-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB