Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 03:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
50d29a8a303a2f48e9a81e662771f7a7.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
50d29a8a303a2f48e9a81e662771f7a7.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
50d29a8a303a2f48e9a81e662771f7a7.exe
-
Size
196KB
-
MD5
50d29a8a303a2f48e9a81e662771f7a7
-
SHA1
50b1c7c73b611cb017d609f98d5f72194556bcc5
-
SHA256
e93e0a7c207fb60fac27461e2a6476c25aa47115a36c538d225e7da0f3784c9e
-
SHA512
5b1cfa14011cac25d7c9ea0e61746e9ed1cb45a9561e1ec3a6bd02e4597341aea150667b2a94c096e48d5726693c701ec72fd90fab94a7cd9e6b7bbb25759521
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B8FpjBFy11Awv:o68i3odBiTl2+TCU/uhuhuItD
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 50d29a8a303a2f48e9a81e662771f7a7.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon2.ico 50d29a8a303a2f48e9a81e662771f7a7.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 50d29a8a303a2f48e9a81e662771f7a7.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 50d29a8a303a2f48e9a81e662771f7a7.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 50d29a8a303a2f48e9a81e662771f7a7.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 50d29a8a303a2f48e9a81e662771f7a7.exe File opened for modification C:\Windows\winhash_up.exez 50d29a8a303a2f48e9a81e662771f7a7.exe File created C:\Windows\winhash_up.exe 50d29a8a303a2f48e9a81e662771f7a7.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 50d29a8a303a2f48e9a81e662771f7a7.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 50d29a8a303a2f48e9a81e662771f7a7.exe File created C:\Windows\bugMAKER.bat 50d29a8a303a2f48e9a81e662771f7a7.exe File created C:\Windows\winhash_up.exez 50d29a8a303a2f48e9a81e662771f7a7.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 50d29a8a303a2f48e9a81e662771f7a7.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3504 wrote to memory of 3512 3504 50d29a8a303a2f48e9a81e662771f7a7.exe 65 PID 3504 wrote to memory of 3512 3504 50d29a8a303a2f48e9a81e662771f7a7.exe 65 PID 3504 wrote to memory of 3512 3504 50d29a8a303a2f48e9a81e662771f7a7.exe 65
Processes
-
C:\Users\Admin\AppData\Local\Temp\50d29a8a303a2f48e9a81e662771f7a7.exe"C:\Users\Admin\AppData\Local\Temp\50d29a8a303a2f48e9a81e662771f7a7.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵PID:3512
-