Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 13:40
Static task
static1
Behavioral task
behavioral1
Sample
a97705b2b2ec6074042fcd8ba8927b39.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a97705b2b2ec6074042fcd8ba8927b39.exe
Resource
win10v2004-20231215-en
General
-
Target
a97705b2b2ec6074042fcd8ba8927b39.exe
-
Size
225KB
-
MD5
a97705b2b2ec6074042fcd8ba8927b39
-
SHA1
5f98d963047cfc7617068d7e5e6fedf6289a971c
-
SHA256
c474e62286535dea753372001b551595499a7da5ca8c366ba945bb3ada0b18cd
-
SHA512
db34e2ed6f250ebebd57499d43e311b4cbf0333449fffffb0d73985c69f1d954edfcaefa5d9f734be865adbaabdacc2415ce1b7497970cd52c8ff6d1311ffcb4
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8ztkaZgxkt39:o68i3odBiTl2+TCU/Ftkqhk8KfQlt
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" a97705b2b2ec6074042fcd8ba8927b39.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\winhash_up.exez a97705b2b2ec6074042fcd8ba8927b39.exe File created C:\Windows\SHARE_TEMP\Icon2.ico a97705b2b2ec6074042fcd8ba8927b39.exe File created C:\Windows\SHARE_TEMP\Icon7.ico a97705b2b2ec6074042fcd8ba8927b39.exe File opened for modification C:\Windows\winhash_up.exez a97705b2b2ec6074042fcd8ba8927b39.exe File created C:\Windows\SHARE_TEMP\Icon13.ico a97705b2b2ec6074042fcd8ba8927b39.exe File created C:\Windows\SHARE_TEMP\Icon14.ico a97705b2b2ec6074042fcd8ba8927b39.exe File created C:\Windows\bugMAKER.bat a97705b2b2ec6074042fcd8ba8927b39.exe File created C:\Windows\winhash_up.exe a97705b2b2ec6074042fcd8ba8927b39.exe File created C:\Windows\SHARE_TEMP\Icon10.ico a97705b2b2ec6074042fcd8ba8927b39.exe File created C:\Windows\SHARE_TEMP\Icon12.ico a97705b2b2ec6074042fcd8ba8927b39.exe File created C:\Windows\SHARE_TEMP\Icon3.ico a97705b2b2ec6074042fcd8ba8927b39.exe File created C:\Windows\SHARE_TEMP\Icon5.ico a97705b2b2ec6074042fcd8ba8927b39.exe File created C:\Windows\SHARE_TEMP\Icon6.ico a97705b2b2ec6074042fcd8ba8927b39.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 1732 2232 a97705b2b2ec6074042fcd8ba8927b39.exe 23 PID 2232 wrote to memory of 1732 2232 a97705b2b2ec6074042fcd8ba8927b39.exe 23 PID 2232 wrote to memory of 1732 2232 a97705b2b2ec6074042fcd8ba8927b39.exe 23 PID 2232 wrote to memory of 1732 2232 a97705b2b2ec6074042fcd8ba8927b39.exe 23
Processes
-
C:\Users\Admin\AppData\Local\Temp\a97705b2b2ec6074042fcd8ba8927b39.exe"C:\Users\Admin\AppData\Local\Temp\a97705b2b2ec6074042fcd8ba8927b39.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:1732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD5d76ef364aa79eb21a102c133abb0e3a0
SHA12d9cba68f3fc4bd33863097727263809f47dee1c
SHA256ef1c6d18cc7cebf960de9c0356cf763eba88cda81bc2fb7d89ef6d5560b4f29f
SHA512cb19dc7e140846a649ec372c7587f7fb8c427a30123cc078c2103e0f76ec5984073a440128b72b61089e0e21c496a764cbbbb255dd7b7fbdd04c60cb264b1a53