Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240611-en -
resource tags
arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system -
submitted
29-06-2024 12:06
Behavioral task
behavioral1
Sample
Freshbuild.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Freshbuild.exe
Resource
win7-20240508-en
Behavioral task
behavioral3
Sample
Freshbuild.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
Freshbuild.exe
Resource
win11-20240611-en
General
-
Target
Freshbuild.exe
-
Size
415KB
-
MD5
07101cac5b9477ba636cd8ca7b9932cb
-
SHA1
59ea7fd9ae6ded8c1b7240a4bf9399b4eb3849f1
-
SHA256
488385cd54d14790b03fa7c7dc997ebea3f7b2a8499e5927eb437a3791102a77
-
SHA512
02240ff51a74966bc31cfcc901105096eb871f588efaa9be1a829b4ee6f245bd9dca37be7e2946ba6315feea75c3dce5f490847250e62081445cd25b0f406887
-
SSDEEP
12288:5fSPtGpmLb84Jjzo6yrBuKuJ+ITOC0Ud:UtGpmf8edykhV0Ud
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
Hkbsse.exe1.exeHkbsse.exeHkbsse.exepid process 3864 Hkbsse.exe 1608 1.exe 2144 Hkbsse.exe 4080 Hkbsse.exe -
Drops file in Windows directory 1 IoCs
Processes:
Freshbuild.exedescription ioc process File created C:\Windows\Tasks\Hkbsse.job Freshbuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1872 1608 WerFault.exe 1.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
Freshbuild.exeHkbsse.exedescription pid process target process PID 2464 wrote to memory of 3864 2464 Freshbuild.exe Hkbsse.exe PID 2464 wrote to memory of 3864 2464 Freshbuild.exe Hkbsse.exe PID 2464 wrote to memory of 3864 2464 Freshbuild.exe Hkbsse.exe PID 3864 wrote to memory of 1608 3864 Hkbsse.exe 1.exe PID 3864 wrote to memory of 1608 3864 Hkbsse.exe 1.exe PID 3864 wrote to memory of 1608 3864 Hkbsse.exe 1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Freshbuild.exe"C:\Users\Admin\AppData\Local\Temp\Freshbuild.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exe"C:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1000026001\1.exe"C:\Users\Admin\AppData\Local\Temp\1000026001\1.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 3844⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1608 -ip 16081⤵
-
C:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1000026001\1.exeFilesize
210KB
MD54e44bde7f6f84e7ce196f0e50c1e7f92
SHA1eaeef05bdb27936123080a9f7d40f463676be208
SHA25619cd5aee7659c7f0acede05ea290754cc649e72929f66b9c6903fa2c8da0d1cd
SHA51206f9ca3d6c6a928a586f5b09c5cfe13c5348c45dbbb047da7fb60caf8a6b710ec3dfd5854b3e1a29b777cca2c573b261f7716edbc5d495b56542d014e4715b14
-
C:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exeFilesize
415KB
MD507101cac5b9477ba636cd8ca7b9932cb
SHA159ea7fd9ae6ded8c1b7240a4bf9399b4eb3849f1
SHA256488385cd54d14790b03fa7c7dc997ebea3f7b2a8499e5927eb437a3791102a77
SHA51202240ff51a74966bc31cfcc901105096eb871f588efaa9be1a829b4ee6f245bd9dca37be7e2946ba6315feea75c3dce5f490847250e62081445cd25b0f406887
-
memory/1608-38-0x0000000000400000-0x0000000002BEE000-memory.dmpFilesize
39.9MB