Analysis

  • max time kernel
    141s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07-05-2024 23:09

General

  • Target

    FabFilter Total Bundle v2023.02.06/R2R/FabFilter_KeyGen.exe

  • Size

    595KB

  • MD5

    c482cbba8d390a0488f33ef36daf2a9e

  • SHA1

    cefb2cd5a09c7f20bb42187acae38fbd3f2da4da

  • SHA256

    7d35e4d663f952f93ef7b271772fc9ce9bc2ff22cb07d9a99f48e47b21517a28

  • SHA512

    b18575e6537d936cd97a0efbf9805081d3e97c540022b46104905a30eae404c0bfbab33a09cf282bfb5cad834886c27e21fda5198bac8d431d5a75af236cab78

  • SSDEEP

    12288:XYkc9t2Sll/5+Fu/dCzO6bqTYFD3fUtPPR5HnCYLJZKrdezL:XYkcL54S4RbYIz89PR1LGBuL

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FabFilter Total Bundle v2023.02.06\R2R\FabFilter_KeyGen.exe
    "C:\Users\Admin\AppData\Local\Temp\FabFilter Total Bundle v2023.02.06\R2R\FabFilter_KeyGen.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Users\Admin\AppData\Local\Temp\keygen.exe
      C:\Users\Admin\AppData\Local\Temp\keygen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\bgm.it

    Filesize

    80KB

    MD5

    5e3c083251880c635f5ea6a0a6ed8e76

    SHA1

    e7fb44133e223140057243493159bdce01c5f080

    SHA256

    9d460a48d7f7f461967c9065182456871606eef1c27f21767335b7d81384e141

    SHA512

    b4a6a5ad71a13f51989e1fccedb542ab528f6ab9bc3d60a4c93c59e544b8eaa06ca7b9fe79c1d9a5c92b61345c18e38736561cd21426bc9e43ae3a4c59424284

  • \Users\Admin\AppData\Local\Temp\BASSMOD.dll

    Filesize

    33KB

    MD5

    e4ec57e8508c5c4040383ebe6d367928

    SHA1

    b22bcce36d9fdeae8ab7a7ecc0b01c8176648d06

    SHA256

    8ad9e47693e292f381da42ddc13724a3063040e51c26f4ca8e1f8e2f1ddd547f

    SHA512

    77d5cf66caf06e192e668fae2b2594e60a498e8e0ccef5b09b9710721a4cdb0c852d00c446fd32c5b5c85e739de2e73cb1f1f6044879fe7d237341bbb6f27822

  • \Users\Admin\AppData\Local\Temp\R2RFBFKG.dll

    Filesize

    91KB

    MD5

    62695f6fa2a85fc9993f57dfcbdc2749

    SHA1

    07a9b478df63fba4cf3002974b4cf56b404d0914

    SHA256

    1ab33027c4965b027298651781a1c780c272818da189e2c3a8101ac578069260

    SHA512

    69dd0de913629853400106811bffdebd8ec2037c93c9f9820d3f140e84576912de3ab57434086e20cf8698185015c27fa307e06047e2219dcf38a927a36f3c95

  • \Users\Admin\AppData\Local\Temp\keygen.exe

    Filesize

    1.0MB

    MD5

    d46b062d7f8ecf948d579ebe809cd597

    SHA1

    bba400b955bca8729bfdffb343d3b9f54cbb42f3

    SHA256

    9dca86bab19f5f0cd7c71ac4797921c93c03894f2378b8b3f4e97d742c9c2ea3

    SHA512

    2c93a1e061a9a77b5c4b5ba8e5f6b4809f225c28b9279cf341c54b8cb586834c7e1ca583df8d8ad4ce8458fcdee306b9f43043b5c2e3f9441f024b4591ce7d49

  • memory/2060-24-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2060-27-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2060-18-0x0000000000220000-0x000000000023F000-memory.dmp

    Filesize

    124KB

  • memory/2060-21-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2060-22-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2060-23-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2060-11-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2060-25-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2060-26-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2060-16-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2060-28-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2060-29-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2060-30-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2060-31-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2060-32-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2060-33-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2060-34-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2060-35-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB