Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/12/2023, 10:49
Static task
static1
Behavioral task
behavioral1
Sample
0cddcde4ae4858ca61a932ad0d982531.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0cddcde4ae4858ca61a932ad0d982531.exe
Resource
win10v2004-20231215-en
General
-
Target
0cddcde4ae4858ca61a932ad0d982531.exe
-
Size
176KB
-
MD5
0cddcde4ae4858ca61a932ad0d982531
-
SHA1
9f79e3bfa2177a0b134f9fcbf9597e227a0bfab5
-
SHA256
c40cb99ff9db03c6451443b9b6ad23cec396a773f04da079cafcafd368d0f31d
-
SHA512
70071401e5307c5c4cf9c890b47b6bc99172186bd144cde7147e458ead9cd4ed3bc07f6fe8c7a82d73de198514366b23fe63272c9e64474e50dc203ea0ee27b3
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B8fh:o68i3odBiTl2+TCU/a
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 0cddcde4ae4858ca61a932ad0d982531.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\bugMAKER.bat 0cddcde4ae4858ca61a932ad0d982531.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 0cddcde4ae4858ca61a932ad0d982531.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 0cddcde4ae4858ca61a932ad0d982531.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 0cddcde4ae4858ca61a932ad0d982531.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 0cddcde4ae4858ca61a932ad0d982531.exe File created C:\Windows\SHARE_TEMP\Icon13.ico 0cddcde4ae4858ca61a932ad0d982531.exe File opened for modification C:\Windows\winhash_up.exez 0cddcde4ae4858ca61a932ad0d982531.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 0cddcde4ae4858ca61a932ad0d982531.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 0cddcde4ae4858ca61a932ad0d982531.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 0cddcde4ae4858ca61a932ad0d982531.exe File created C:\Windows\winhash_up.exez 0cddcde4ae4858ca61a932ad0d982531.exe File created C:\Windows\winhash_up.exe 0cddcde4ae4858ca61a932ad0d982531.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 0cddcde4ae4858ca61a932ad0d982531.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2404 1716 0cddcde4ae4858ca61a932ad0d982531.exe 28 PID 1716 wrote to memory of 2404 1716 0cddcde4ae4858ca61a932ad0d982531.exe 28 PID 1716 wrote to memory of 2404 1716 0cddcde4ae4858ca61a932ad0d982531.exe 28 PID 1716 wrote to memory of 2404 1716 0cddcde4ae4858ca61a932ad0d982531.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cddcde4ae4858ca61a932ad0d982531.exe"C:\Users\Admin\AppData\Local\Temp\0cddcde4ae4858ca61a932ad0d982531.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD5a7d290a64b634cb4b7a01a9d159d9404
SHA13ec2da0f0f3d6577c6bf5cd3c8be7371d89f06ec
SHA2560d171b1af2e2890222a2eaa7d18fb6d5207229d07e874920e0d0514c53fb6024
SHA512354f11835ee22898bc0729eafcfd9505286ac1168ea51aaec6990cd11794793110dca0c1dd3bdb40b7270fe93e9e70b4d54e5ec888f2f38f8dc5156d93621053