Analysis
-
max time kernel
118s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19-12-2023 22:05
Static task
static1
Behavioral task
behavioral1
Sample
b141d4c4a3fe6fc80c8a3cdc6373526b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b141d4c4a3fe6fc80c8a3cdc6373526b.exe
Resource
win10v2004-20231215-en
General
-
Target
b141d4c4a3fe6fc80c8a3cdc6373526b.exe
-
Size
236KB
-
MD5
b141d4c4a3fe6fc80c8a3cdc6373526b
-
SHA1
f12a07b0a23c55677566aeef93a0a0f00a7f2bcc
-
SHA256
e4dae7a406ad8b52632f55295e66bae6722ba69c60def1ea1a160cc9c4a13c5e
-
SHA512
d7bf73d47cce33bd3eaa11dbfb4e31fc1c0159a12950eb53fe201563bfb011fe69eaccdce2cd384e5a7c3aaabeedc2df4a1cbd02bd21c741c2d264bea3269b5b
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/8583k/kgnYHfl:o68i3odBiTl2+TCU/8Gk/k8KfQlE7
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" b141d4c4a3fe6fc80c8a3cdc6373526b.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\winhash_up.exez b141d4c4a3fe6fc80c8a3cdc6373526b.exe File opened for modification C:\Windows\winhash_up.exez b141d4c4a3fe6fc80c8a3cdc6373526b.exe File created C:\Windows\SHARE_TEMP\Icon6.ico b141d4c4a3fe6fc80c8a3cdc6373526b.exe File created C:\Windows\SHARE_TEMP\Icon10.ico b141d4c4a3fe6fc80c8a3cdc6373526b.exe File created C:\Windows\SHARE_TEMP\Icon12.ico b141d4c4a3fe6fc80c8a3cdc6373526b.exe File created C:\Windows\bugMAKER.bat b141d4c4a3fe6fc80c8a3cdc6373526b.exe File created C:\Windows\winhash_up.exe b141d4c4a3fe6fc80c8a3cdc6373526b.exe File created C:\Windows\SHARE_TEMP\Icon2.ico b141d4c4a3fe6fc80c8a3cdc6373526b.exe File created C:\Windows\SHARE_TEMP\Icon7.ico b141d4c4a3fe6fc80c8a3cdc6373526b.exe File created C:\Windows\SHARE_TEMP\Icon13.ico b141d4c4a3fe6fc80c8a3cdc6373526b.exe File created C:\Windows\SHARE_TEMP\Icon3.ico b141d4c4a3fe6fc80c8a3cdc6373526b.exe File created C:\Windows\SHARE_TEMP\Icon5.ico b141d4c4a3fe6fc80c8a3cdc6373526b.exe File created C:\Windows\SHARE_TEMP\Icon14.ico b141d4c4a3fe6fc80c8a3cdc6373526b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2708 2764 b141d4c4a3fe6fc80c8a3cdc6373526b.exe 27 PID 2764 wrote to memory of 2708 2764 b141d4c4a3fe6fc80c8a3cdc6373526b.exe 27 PID 2764 wrote to memory of 2708 2764 b141d4c4a3fe6fc80c8a3cdc6373526b.exe 27 PID 2764 wrote to memory of 2708 2764 b141d4c4a3fe6fc80c8a3cdc6373526b.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\b141d4c4a3fe6fc80c8a3cdc6373526b.exe"C:\Users\Admin\AppData\Local\Temp\b141d4c4a3fe6fc80c8a3cdc6373526b.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD555663a7ff496d07a78b1827c0a628629
SHA145c52e24104790c6f6e85bca74361f8a2b5ade33
SHA256ae1d27432af09177a872d8bf1182509cfb66ef5fce9de027ce486caa55117937
SHA51217df0eae7f261e7b0f0799ffa574edfd1155c7ff4766fc648670148a506185004352777b246b7b9fe0292a75c4a6a22c3fb2723e874e6aff95204b70ff4868a2