Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19-12-2023 14:07
Static task
static1
Behavioral task
behavioral1
Sample
3e1966565d384447ac30ee488d3e2e23.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3e1966565d384447ac30ee488d3e2e23.exe
Resource
win10v2004-20231201-en
General
-
Target
3e1966565d384447ac30ee488d3e2e23.exe
-
Size
164KB
-
MD5
3e1966565d384447ac30ee488d3e2e23
-
SHA1
ba19d1dc7ccf532158e3a4bbad8e1f3fbe24d733
-
SHA256
1048783b90572918df27b625ba592995964bdd3a80721261993972276f259695
-
SHA512
d3674bd4fa70ad3efe4020e147a3415c62451503653a32dc06cbfbca79e0309b92b37efda18b2b7e4c60b7d730d34d62eae948eb873c57b1a31591bca2330620
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B86:o68i3odBiTl2+TCU/z
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 3e1966565d384447ac30ee488d3e2e23.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\winhash_up.exez 3e1966565d384447ac30ee488d3e2e23.exe File opened for modification C:\Windows\winhash_up.exez 3e1966565d384447ac30ee488d3e2e23.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 3e1966565d384447ac30ee488d3e2e23.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 3e1966565d384447ac30ee488d3e2e23.exe File created C:\Windows\SHARE_TEMP\Icon13.ico 3e1966565d384447ac30ee488d3e2e23.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 3e1966565d384447ac30ee488d3e2e23.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 3e1966565d384447ac30ee488d3e2e23.exe File created C:\Windows\winhash_up.exe 3e1966565d384447ac30ee488d3e2e23.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 3e1966565d384447ac30ee488d3e2e23.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 3e1966565d384447ac30ee488d3e2e23.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 3e1966565d384447ac30ee488d3e2e23.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 3e1966565d384447ac30ee488d3e2e23.exe File created C:\Windows\bugMAKER.bat 3e1966565d384447ac30ee488d3e2e23.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2816 2192 3e1966565d384447ac30ee488d3e2e23.exe 28 PID 2192 wrote to memory of 2816 2192 3e1966565d384447ac30ee488d3e2e23.exe 28 PID 2192 wrote to memory of 2816 2192 3e1966565d384447ac30ee488d3e2e23.exe 28 PID 2192 wrote to memory of 2816 2192 3e1966565d384447ac30ee488d3e2e23.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e1966565d384447ac30ee488d3e2e23.exe"C:\Users\Admin\AppData\Local\Temp\3e1966565d384447ac30ee488d3e2e23.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD55417791ccd21a2d464cb15d8515b111f
SHA176a5234f7fd31c89366835a7986cce3c6a151ccb
SHA25671dd208a647c3f13338ded340e575dedee7e2425e22fe8a70276bbb6b2a7f537
SHA51242b63765af080387fbedcb47756833807192bed4727442110600d7502e9db16f9834726483d4a14835675513a0d8216f9e5ea3173403e57fef2ffc390cebc1ec