Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/12/2023, 14:04
Static task
static1
Behavioral task
behavioral1
Sample
3d4cc5a7663f1b17bd99b696ecc5b88f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3d4cc5a7663f1b17bd99b696ecc5b88f.exe
Resource
win10v2004-20231201-en
General
-
Target
3d4cc5a7663f1b17bd99b696ecc5b88f.exe
-
Size
216KB
-
MD5
3d4cc5a7663f1b17bd99b696ecc5b88f
-
SHA1
5d88450c1be70273be9733c6f0f041982178f40b
-
SHA256
a0711de6894921aa9312396715d4cb104fa1e6298bec8a454d0f69019184a32a
-
SHA512
be904e6112c0c1b15ccb612daa7c465a072f9f314a013d64de0cb08bc5f1e66145c0df694f6c6e0720aa61072e04c2ee2ec8e52378904f306ddd4404074417ac
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B81kgnYHfQlA8:o68i3odBiTl2+TCU/Sk8KfQlEg
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 3d4cc5a7663f1b17bd99b696ecc5b88f.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon12.ico 3d4cc5a7663f1b17bd99b696ecc5b88f.exe File created C:\Windows\bugMAKER.bat 3d4cc5a7663f1b17bd99b696ecc5b88f.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 3d4cc5a7663f1b17bd99b696ecc5b88f.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 3d4cc5a7663f1b17bd99b696ecc5b88f.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 3d4cc5a7663f1b17bd99b696ecc5b88f.exe File created C:\Windows\SHARE_TEMP\Icon13.ico 3d4cc5a7663f1b17bd99b696ecc5b88f.exe File created C:\Windows\winhash_up.exe 3d4cc5a7663f1b17bd99b696ecc5b88f.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 3d4cc5a7663f1b17bd99b696ecc5b88f.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 3d4cc5a7663f1b17bd99b696ecc5b88f.exe File created C:\Windows\winhash_up.exez 3d4cc5a7663f1b17bd99b696ecc5b88f.exe File opened for modification C:\Windows\winhash_up.exez 3d4cc5a7663f1b17bd99b696ecc5b88f.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 3d4cc5a7663f1b17bd99b696ecc5b88f.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 3d4cc5a7663f1b17bd99b696ecc5b88f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2792 2472 3d4cc5a7663f1b17bd99b696ecc5b88f.exe 28 PID 2472 wrote to memory of 2792 2472 3d4cc5a7663f1b17bd99b696ecc5b88f.exe 28 PID 2472 wrote to memory of 2792 2472 3d4cc5a7663f1b17bd99b696ecc5b88f.exe 28 PID 2472 wrote to memory of 2792 2472 3d4cc5a7663f1b17bd99b696ecc5b88f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d4cc5a7663f1b17bd99b696ecc5b88f.exe"C:\Users\Admin\AppData\Local\Temp\3d4cc5a7663f1b17bd99b696ecc5b88f.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:2792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD58894a17cf69139ad9df3dd38d8e2bb59
SHA12b00525c708eacac521743a268f4c39ee7285de2
SHA2560418629db03273c2dedb6355ef36715c2ad391ad0f981ff894f61e77aebd9b64
SHA512f575708d7da83888f84b74c28b6b9820b779e9dcf955e747d5fced3e024f5f777233edef4b1a9ba49b0b82caac9453b1896a6f2d909a97e85260bdfd43c72554