Analysis
-
max time kernel
163s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 13:48
Static task
static1
Behavioral task
behavioral1
Sample
ae2c65e68cc3fadab97afff6d0d13fd4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ae2c65e68cc3fadab97afff6d0d13fd4.exe
Resource
win10v2004-20231215-en
General
-
Target
ae2c65e68cc3fadab97afff6d0d13fd4.exe
-
Size
175KB
-
MD5
ae2c65e68cc3fadab97afff6d0d13fd4
-
SHA1
43dcaa1f78b590ebd26aa1c6ce73b28a54297c86
-
SHA256
bfe788a6cedb8e4f3c32b5b1da325742bd4fd136cb9c84652b8a41fc1b316d8c
-
SHA512
8de2a5805bb42c44c36dcde0aa575d9a8435d3bd6324364520c5ea3d7be079c1e8db95c5b974e42d9a3528e269fedd8669cf362feb9712e32787dd5c5209ba9e
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8LtkaN:o68i3odBiTl2+TCU/9tks
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" ae2c65e68cc3fadab97afff6d0d13fd4.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\winhash_up.exe ae2c65e68cc3fadab97afff6d0d13fd4.exe File created C:\Windows\SHARE_TEMP\Icon2.ico ae2c65e68cc3fadab97afff6d0d13fd4.exe File created C:\Windows\SHARE_TEMP\Icon12.ico ae2c65e68cc3fadab97afff6d0d13fd4.exe File created C:\Windows\bugMAKER.bat ae2c65e68cc3fadab97afff6d0d13fd4.exe File created C:\Windows\SHARE_TEMP\Icon6.ico ae2c65e68cc3fadab97afff6d0d13fd4.exe File created C:\Windows\SHARE_TEMP\Icon7.ico ae2c65e68cc3fadab97afff6d0d13fd4.exe File created C:\Windows\SHARE_TEMP\Icon10.ico ae2c65e68cc3fadab97afff6d0d13fd4.exe File created C:\Windows\SHARE_TEMP\Icon14.ico ae2c65e68cc3fadab97afff6d0d13fd4.exe File created C:\Windows\winhash_up.exez ae2c65e68cc3fadab97afff6d0d13fd4.exe File opened for modification C:\Windows\winhash_up.exez ae2c65e68cc3fadab97afff6d0d13fd4.exe File created C:\Windows\SHARE_TEMP\Icon3.ico ae2c65e68cc3fadab97afff6d0d13fd4.exe File created C:\Windows\SHARE_TEMP\Icon5.ico ae2c65e68cc3fadab97afff6d0d13fd4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5076 wrote to memory of 2288 5076 ae2c65e68cc3fadab97afff6d0d13fd4.exe 93 PID 5076 wrote to memory of 2288 5076 ae2c65e68cc3fadab97afff6d0d13fd4.exe 93 PID 5076 wrote to memory of 2288 5076 ae2c65e68cc3fadab97afff6d0d13fd4.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae2c65e68cc3fadab97afff6d0d13fd4.exe"C:\Users\Admin\AppData\Local\Temp\ae2c65e68cc3fadab97afff6d0d13fd4.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵PID:2288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD583962617d05b9d5f4dbd6410736bb197
SHA1bbf6c7ea5726ba2250ab56a62f5ac2e1ecdd72ca
SHA25607a9d4ac4b136f63c06e8557a833d3cbea0494939c0dfdc41fa0f0fb41ccf3ba
SHA512e2f426792d00ee1f1bfda2a91483e6c81c454d3a11e90ffe84b7577b23fc5f6d54197ae0b7e4d937fbca9d269e04e7ab1921b43d7b78114909e68129925cf83c