Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
29-06-2024 12:06
Behavioral task
behavioral1
Sample
Freshbuild.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Freshbuild.exe
Resource
win7-20240508-en
Behavioral task
behavioral3
Sample
Freshbuild.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
Freshbuild.exe
Resource
win11-20240611-en
General
-
Target
Freshbuild.exe
-
Size
415KB
-
MD5
07101cac5b9477ba636cd8ca7b9932cb
-
SHA1
59ea7fd9ae6ded8c1b7240a4bf9399b4eb3849f1
-
SHA256
488385cd54d14790b03fa7c7dc997ebea3f7b2a8499e5927eb437a3791102a77
-
SHA512
02240ff51a74966bc31cfcc901105096eb871f588efaa9be1a829b4ee6f245bd9dca37be7e2946ba6315feea75c3dce5f490847250e62081445cd25b0f406887
-
SSDEEP
12288:5fSPtGpmLb84Jjzo6yrBuKuJ+ITOC0Ud:UtGpmf8edykhV0Ud
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Hkbsse.exepid process 2972 Hkbsse.exe -
Loads dropped DLL 1 IoCs
Processes:
Freshbuild.exepid process 1740 Freshbuild.exe -
Drops file in Windows directory 1 IoCs
Processes:
Freshbuild.exedescription ioc process File created C:\Windows\Tasks\Hkbsse.job Freshbuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
Freshbuild.exepid process 1740 Freshbuild.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
Freshbuild.exedescription pid process target process PID 1740 wrote to memory of 2972 1740 Freshbuild.exe Hkbsse.exe PID 1740 wrote to memory of 2972 1740 Freshbuild.exe Hkbsse.exe PID 1740 wrote to memory of 2972 1740 Freshbuild.exe Hkbsse.exe PID 1740 wrote to memory of 2972 1740 Freshbuild.exe Hkbsse.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Freshbuild.exe"C:\Users\Admin\AppData\Local\Temp\Freshbuild.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exe"C:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exe"2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exeFilesize
415KB
MD507101cac5b9477ba636cd8ca7b9932cb
SHA159ea7fd9ae6ded8c1b7240a4bf9399b4eb3849f1
SHA256488385cd54d14790b03fa7c7dc997ebea3f7b2a8499e5927eb437a3791102a77
SHA51202240ff51a74966bc31cfcc901105096eb871f588efaa9be1a829b4ee6f245bd9dca37be7e2946ba6315feea75c3dce5f490847250e62081445cd25b0f406887
-
memory/1740-1-0x0000000000380000-0x0000000000381000-memory.dmpFilesize
4KB