Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    03-02-2024 02:37

General

  • Target

    8b2dae0ca4fcaa27a4ee6993c6d925bc.exe

  • Size

    209KB

  • MD5

    8b2dae0ca4fcaa27a4ee6993c6d925bc

  • SHA1

    4150ff0af606c65846df49dbb4daa5a813e4947a

  • SHA256

    9bf936c5581ea04d9979a6c223342f6067b18ceb810fd6f3060a0287ab3edcee

  • SHA512

    943d24ccda52984a43a51fb1ca4643c3422ca0516f1a9a4ef3a48dc4c17a8ed8990e58aef381375da851004fd924c195d6035c70f102874f6bf1b707c259a8b9

  • SSDEEP

    3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B8dpjBFy11Awi:o68i3odBiTl2+TCU/ihuhuIp4

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\SysWOW64\cmd.exe
    cmd /c C:\Windows\bugMAKER.bat
    1⤵
      PID:1392
    • C:\Users\Admin\AppData\Local\Temp\8b2dae0ca4fcaa27a4ee6993c6d925bc.exe
      "C:\Users\Admin\AppData\Local\Temp\8b2dae0ca4fcaa27a4ee6993c6d925bc.exe"
      1⤵
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2092

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\bugMAKER.bat

      Filesize

      76B

      MD5

      1a24f0d49e8ca89bcba1ef514d752470

      SHA1

      271e22b448b5806a1304ea43b528af7d69478200

      SHA256

      bc15d0797df9d2339737ab441be03d96f108a740aaae90bb8de6b053f14365f1

      SHA512

      50535598e67f4dd7198ff555624ac52901714cc12d506e3ae21c46f1a2e02345353a92b15fe849a3f6e54a36bd7267d6654701c5939d1090076bfc89df909b8b

    • memory/1392-62-0x0000000002360000-0x0000000002361000-memory.dmp

      Filesize

      4KB

    • memory/2092-67-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB