Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 05:48
Static task
static1
Behavioral task
behavioral1
Sample
57e63b7664bbcfe43669213b95682899.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
57e63b7664bbcfe43669213b95682899.exe
Resource
win10v2004-20231215-en
General
-
Target
57e63b7664bbcfe43669213b95682899.exe
-
Size
165KB
-
MD5
57e63b7664bbcfe43669213b95682899
-
SHA1
7d236469df92242c282b09dd5fb0725001e54aaa
-
SHA256
343974cf779d5c793cf64b623c3ad2977524648f2b1fb0d2111322f8007819c5
-
SHA512
e238533d04ae596407c0a2e6084e2a421cecce7ced293192753f58fa96c2c72c342e5e40401b4ae10e99fda9ecc041ea347fc08b246277212118e73ce9eda081
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B85:o68i3odBiTl2+TCU/C
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 57e63b7664bbcfe43669213b95682899.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\winhash_up.exez 57e63b7664bbcfe43669213b95682899.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 57e63b7664bbcfe43669213b95682899.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 57e63b7664bbcfe43669213b95682899.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 57e63b7664bbcfe43669213b95682899.exe File opened for modification C:\Windows\winhash_up.exez 57e63b7664bbcfe43669213b95682899.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 57e63b7664bbcfe43669213b95682899.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 57e63b7664bbcfe43669213b95682899.exe File created C:\Windows\winhash_up.exe 57e63b7664bbcfe43669213b95682899.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 57e63b7664bbcfe43669213b95682899.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 57e63b7664bbcfe43669213b95682899.exe File created C:\Windows\bugMAKER.bat 57e63b7664bbcfe43669213b95682899.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 57e63b7664bbcfe43669213b95682899.exe File created C:\Windows\SHARE_TEMP\Icon13.ico 57e63b7664bbcfe43669213b95682899.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1300 wrote to memory of 2712 1300 57e63b7664bbcfe43669213b95682899.exe 27 PID 1300 wrote to memory of 2712 1300 57e63b7664bbcfe43669213b95682899.exe 27 PID 1300 wrote to memory of 2712 1300 57e63b7664bbcfe43669213b95682899.exe 27 PID 1300 wrote to memory of 2712 1300 57e63b7664bbcfe43669213b95682899.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\57e63b7664bbcfe43669213b95682899.exe"C:\Users\Admin\AppData\Local\Temp\57e63b7664bbcfe43669213b95682899.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD51a01ab03c5fb4f1c867c3089f478f4ae
SHA16c511239de52f30edf7502b206c1e82dce3dbd02
SHA256956a96286379637f4253c1e82d1326b5de94eaa97a243e1aed4eeaa2561c86c5
SHA5123b9611400b15d971fc1d97031f12bc0dcd81b170cdf969822c4243beb2edf39467a99743d09badfae70fe990f4e2dcf79b090f1fb40bf864dd3144418200275e