Analysis

  • max time kernel
    134s
  • max time network
    109s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-09-2024 00:21

General

  • Target

    2f199a8059a95b58535067f49212a3247acd11ec9395870abe26e36318b99caf.exe

  • Size

    202KB

  • MD5

    c6d5f52fc8a5c1061254d6e855bd3a46

  • SHA1

    a4bd21f55a07907dda94db15291e71c112c200ea

  • SHA256

    2f199a8059a95b58535067f49212a3247acd11ec9395870abe26e36318b99caf

  • SHA512

    eca45eb372de757d1bab758737210b09b550e5d25786afb535416d60f846009877363ee8f1cdb3a6ff239af41c61e0b69be76d604e96c43381804cf4a1583c3a

  • SSDEEP

    3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/858KkgnnpjBFB:o68i3odBiTl2+TCU/8nk8NhX

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f199a8059a95b58535067f49212a3247acd11ec9395870abe26e36318b99caf.exe
    "C:\Users\Admin\AppData\Local\Temp\2f199a8059a95b58535067f49212a3247acd11ec9395870abe26e36318b99caf.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3632
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:5080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\bugMAKER.bat

    Filesize

    108B

    MD5

    c7dbf4c5a9c41aed4bcacff781e74a59

    SHA1

    b526ecb6f9e5c091cc89047c36691d6d8e82499e

    SHA256

    f0ecff1a09f0ec5b1428508c5f788b94592054a98a30a9a5b81334ef16fcdf30

    SHA512

    a36763dbc42f621f51c9a80c1e336ab6851e4a3a8eb9dce89a3483c569ca3a315bc42919589c61db8725ed4ef8b645cc46babd6042462e114b99483abc05b976

  • memory/3632-24-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB