Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/12/2023, 23:17
Static task
static1
Behavioral task
behavioral1
Sample
ff4cf1faf2b811dfb2e181d28467b207.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ff4cf1faf2b811dfb2e181d28467b207.exe
Resource
win10v2004-20231222-en
General
-
Target
ff4cf1faf2b811dfb2e181d28467b207.exe
-
Size
226KB
-
MD5
ff4cf1faf2b811dfb2e181d28467b207
-
SHA1
ac24ba2d426f9e26872128ef8400ab96d9ce3151
-
SHA256
5a78df3b29f76c017c035ca979bbacd39b44a7a7f4644593f296bd5ddbf3fde8
-
SHA512
23db341879d3ef3bd6b5a234e2b2e0d4358dbf9a44c628a493f7b7f744d0e993beecb18bbefb603cff44fd5af92d5389dec11f350adad2cc201646ebcabc9033
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B8/tkaZgxktEw:o68i3odBiTl2+TCU/6tkqxahuhuIX
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" ff4cf1faf2b811dfb2e181d28467b207.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\winhash_up.exe ff4cf1faf2b811dfb2e181d28467b207.exe File created C:\Windows\SHARE_TEMP\Icon13.ico ff4cf1faf2b811dfb2e181d28467b207.exe File created C:\Windows\winhash_up.exez ff4cf1faf2b811dfb2e181d28467b207.exe File created C:\Windows\SHARE_TEMP\Icon3.ico ff4cf1faf2b811dfb2e181d28467b207.exe File created C:\Windows\SHARE_TEMP\Icon5.ico ff4cf1faf2b811dfb2e181d28467b207.exe File created C:\Windows\SHARE_TEMP\Icon10.ico ff4cf1faf2b811dfb2e181d28467b207.exe File created C:\Windows\SHARE_TEMP\Icon14.ico ff4cf1faf2b811dfb2e181d28467b207.exe File created C:\Windows\SHARE_TEMP\Icon6.ico ff4cf1faf2b811dfb2e181d28467b207.exe File created C:\Windows\SHARE_TEMP\Icon12.ico ff4cf1faf2b811dfb2e181d28467b207.exe File created C:\Windows\bugMAKER.bat ff4cf1faf2b811dfb2e181d28467b207.exe File opened for modification C:\Windows\winhash_up.exez ff4cf1faf2b811dfb2e181d28467b207.exe File created C:\Windows\SHARE_TEMP\Icon2.ico ff4cf1faf2b811dfb2e181d28467b207.exe File created C:\Windows\SHARE_TEMP\Icon7.ico ff4cf1faf2b811dfb2e181d28467b207.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2872 2180 ff4cf1faf2b811dfb2e181d28467b207.exe 16 PID 2180 wrote to memory of 2872 2180 ff4cf1faf2b811dfb2e181d28467b207.exe 16 PID 2180 wrote to memory of 2872 2180 ff4cf1faf2b811dfb2e181d28467b207.exe 16 PID 2180 wrote to memory of 2872 2180 ff4cf1faf2b811dfb2e181d28467b207.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff4cf1faf2b811dfb2e181d28467b207.exe"C:\Users\Admin\AppData\Local\Temp\ff4cf1faf2b811dfb2e181d28467b207.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:2872
-