Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 13:25
Static task
static1
Behavioral task
behavioral1
Sample
a240e3cf69ab3b831c855bf705e2cc38.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a240e3cf69ab3b831c855bf705e2cc38.exe
Resource
win10v2004-20231215-en
General
-
Target
a240e3cf69ab3b831c855bf705e2cc38.exe
-
Size
195KB
-
MD5
a240e3cf69ab3b831c855bf705e2cc38
-
SHA1
ee2ef545973b73b2efcf64f355ba80e7c7ad2794
-
SHA256
01a759522c503ffdd6f063ad157dc2375b5fd23d3cdeb73736ab7931841f3964
-
SHA512
90bd52d7e284402c5b44f36c062e20067f02dc1a670e51124259a4ea2e98261d5ecf07b7705f6d7c44a44637ff3d9d625e3531fb5cfa7fe2cd9deffc1e42fad6
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B8WpjBFy11Awh:o68i3odBiTl2+TCU/bhuhuI1
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" a240e3cf69ab3b831c855bf705e2cc38.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File opened for modification C:\Windows\winhash_up.exez a240e3cf69ab3b831c855bf705e2cc38.exe File created C:\Windows\SHARE_TEMP\Icon7.ico a240e3cf69ab3b831c855bf705e2cc38.exe File created C:\Windows\SHARE_TEMP\Icon10.ico a240e3cf69ab3b831c855bf705e2cc38.exe File created C:\Windows\SHARE_TEMP\Icon6.ico a240e3cf69ab3b831c855bf705e2cc38.exe File created C:\Windows\SHARE_TEMP\Icon13.ico a240e3cf69ab3b831c855bf705e2cc38.exe File created C:\Windows\winhash_up.exez a240e3cf69ab3b831c855bf705e2cc38.exe File created C:\Windows\SHARE_TEMP\Icon3.ico a240e3cf69ab3b831c855bf705e2cc38.exe File created C:\Windows\SHARE_TEMP\Icon5.ico a240e3cf69ab3b831c855bf705e2cc38.exe File created C:\Windows\SHARE_TEMP\Icon12.ico a240e3cf69ab3b831c855bf705e2cc38.exe File created C:\Windows\bugMAKER.bat a240e3cf69ab3b831c855bf705e2cc38.exe File created C:\Windows\winhash_up.exe a240e3cf69ab3b831c855bf705e2cc38.exe File created C:\Windows\SHARE_TEMP\Icon2.ico a240e3cf69ab3b831c855bf705e2cc38.exe File created C:\Windows\SHARE_TEMP\Icon14.ico a240e3cf69ab3b831c855bf705e2cc38.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2700 2204 a240e3cf69ab3b831c855bf705e2cc38.exe 28 PID 2204 wrote to memory of 2700 2204 a240e3cf69ab3b831c855bf705e2cc38.exe 28 PID 2204 wrote to memory of 2700 2204 a240e3cf69ab3b831c855bf705e2cc38.exe 28 PID 2204 wrote to memory of 2700 2204 a240e3cf69ab3b831c855bf705e2cc38.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a240e3cf69ab3b831c855bf705e2cc38.exe"C:\Users\Admin\AppData\Local\Temp\a240e3cf69ab3b831c855bf705e2cc38.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD5612dbef5ef58483524040985d5b2aab5
SHA10fb304706720880f594692816473fc1090df021f
SHA2562c808b1bff57384fc9589691918bd84a93a8cb0f748613c1c20abd471f27cb37
SHA512fcb26ee26f34832313ab83753a3ed69d51dae79cbed5847af8a20a38d17540bdf5f0dbbbf9af4980f7bf01d8ee3aafeb5fd45eef492668bf0fe722f19caab564