Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 14:12
Static task
static1
Behavioral task
behavioral1
Sample
baaa96aff39ab469dd7b9f349a0ca99b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
baaa96aff39ab469dd7b9f349a0ca99b.exe
Resource
win10v2004-20231215-en
General
-
Target
baaa96aff39ab469dd7b9f349a0ca99b.exe
-
Size
165KB
-
MD5
baaa96aff39ab469dd7b9f349a0ca99b
-
SHA1
89ad3ad3e453ef1d0eb98f39f82f9311a5e2c552
-
SHA256
b5ea6c0b6046f1df64aa99356e4d1055ee55ae60fad8d747e30759fd0802c1c7
-
SHA512
c96eb7d1e75330a41ef83a4405ed264abf5ad52bbe2667a374f8eef70a254f772b6b185a6076b04ab2fa0e13d8d7ccf88d7114cb8a9106c60c3c33bf1803a9e2
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B8f:o68i3odBiTl2+TCU/K
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" baaa96aff39ab469dd7b9f349a0ca99b.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\winhash_up.exe baaa96aff39ab469dd7b9f349a0ca99b.exe File created C:\Windows\SHARE_TEMP\Icon3.ico baaa96aff39ab469dd7b9f349a0ca99b.exe File created C:\Windows\SHARE_TEMP\Icon5.ico baaa96aff39ab469dd7b9f349a0ca99b.exe File created C:\Windows\SHARE_TEMP\Icon7.ico baaa96aff39ab469dd7b9f349a0ca99b.exe File created C:\Windows\SHARE_TEMP\Icon14.ico baaa96aff39ab469dd7b9f349a0ca99b.exe File created C:\Windows\winhash_up.exez baaa96aff39ab469dd7b9f349a0ca99b.exe File opened for modification C:\Windows\winhash_up.exez baaa96aff39ab469dd7b9f349a0ca99b.exe File created C:\Windows\SHARE_TEMP\Icon2.ico baaa96aff39ab469dd7b9f349a0ca99b.exe File created C:\Windows\SHARE_TEMP\Icon6.ico baaa96aff39ab469dd7b9f349a0ca99b.exe File created C:\Windows\bugMAKER.bat baaa96aff39ab469dd7b9f349a0ca99b.exe File created C:\Windows\SHARE_TEMP\Icon10.ico baaa96aff39ab469dd7b9f349a0ca99b.exe File created C:\Windows\SHARE_TEMP\Icon12.ico baaa96aff39ab469dd7b9f349a0ca99b.exe File created C:\Windows\SHARE_TEMP\Icon13.ico baaa96aff39ab469dd7b9f349a0ca99b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2668 2872 baaa96aff39ab469dd7b9f349a0ca99b.exe 28 PID 2872 wrote to memory of 2668 2872 baaa96aff39ab469dd7b9f349a0ca99b.exe 28 PID 2872 wrote to memory of 2668 2872 baaa96aff39ab469dd7b9f349a0ca99b.exe 28 PID 2872 wrote to memory of 2668 2872 baaa96aff39ab469dd7b9f349a0ca99b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\baaa96aff39ab469dd7b9f349a0ca99b.exe"C:\Users\Admin\AppData\Local\Temp\baaa96aff39ab469dd7b9f349a0ca99b.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD5976e10803d68d378cf2b6b1352d80ec8
SHA19bdf379ec8b5e824d97ab099c08819a59346453c
SHA2569eebe910f79d4761c35235335590fdab6ce82bceeef643cc921c01bab550967c
SHA5122a7f6438198e2841978be14138d52aa80900c7084c496c9bfaff4ec8b6aebbfc7e79b2345ca09878aa009c73cc4eb5bfba48ba7ef34ba78775bc02d1fe5576b1