Analysis
-
max time kernel
0s -
max time network
16s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/12/2023, 21:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
faa4482d012dfb7b4938bc34d884061d.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
faa4482d012dfb7b4938bc34d884061d.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
faa4482d012dfb7b4938bc34d884061d.exe
-
Size
205KB
-
MD5
faa4482d012dfb7b4938bc34d884061d
-
SHA1
188b281e830e485db85569369de89a55ba89a996
-
SHA256
58355bfb727d4facd0250089f94c5367d1e9a07070cb099117bda247ab7065f2
-
SHA512
88224998823bcf8ff4102a45ea8513f21c39b771da5a97a9895c79abb1341efd396ded27b1f875f52a54d3c7b3204e16c9481826c76eb06c249f8caa5459439f
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/18Kh1thz/u:o68i3odBiTl2+TCU/R1thzu
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" faa4482d012dfb7b4938bc34d884061d.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\winhash_up.exe faa4482d012dfb7b4938bc34d884061d.exe File created C:\Windows\SHARE_TEMP\Icon2.ico faa4482d012dfb7b4938bc34d884061d.exe File created C:\Windows\SHARE_TEMP\Icon3.ico faa4482d012dfb7b4938bc34d884061d.exe File created C:\Windows\SHARE_TEMP\Icon6.ico faa4482d012dfb7b4938bc34d884061d.exe File created C:\Windows\SHARE_TEMP\Icon7.ico faa4482d012dfb7b4938bc34d884061d.exe File created C:\Windows\winhash_up.exez faa4482d012dfb7b4938bc34d884061d.exe File opened for modification C:\Windows\winhash_up.exez faa4482d012dfb7b4938bc34d884061d.exe File created C:\Windows\SHARE_TEMP\Icon5.ico faa4482d012dfb7b4938bc34d884061d.exe File created C:\Windows\SHARE_TEMP\Icon10.ico faa4482d012dfb7b4938bc34d884061d.exe File created C:\Windows\SHARE_TEMP\Icon12.ico faa4482d012dfb7b4938bc34d884061d.exe File created C:\Windows\SHARE_TEMP\Icon14.ico faa4482d012dfb7b4938bc34d884061d.exe File created C:\Windows\bugMAKER.bat faa4482d012dfb7b4938bc34d884061d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4904 wrote to memory of 3888 4904 faa4482d012dfb7b4938bc34d884061d.exe 18 PID 4904 wrote to memory of 3888 4904 faa4482d012dfb7b4938bc34d884061d.exe 18 PID 4904 wrote to memory of 3888 4904 faa4482d012dfb7b4938bc34d884061d.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\faa4482d012dfb7b4938bc34d884061d.exe"C:\Users\Admin\AppData\Local\Temp\faa4482d012dfb7b4938bc34d884061d.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵PID:3888
-