Analysis
-
max time kernel
0s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 18:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
007e15d58faf04f5c0875d202e3100e3.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
007e15d58faf04f5c0875d202e3100e3.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
007e15d58faf04f5c0875d202e3100e3.exe
-
Size
472KB
-
MD5
007e15d58faf04f5c0875d202e3100e3
-
SHA1
24183532a09212fd86eef5ac6075aefd4045033a
-
SHA256
8681fa89c80160227e61442509fadfdf8e21cb71ef1f1dc652546e8fdc64f6a5
-
SHA512
b083450d5857089c98f3b5bbec343db380758b12089710fe319d67b6a402afb75fb55d7d6336ed0d5278159368bd4e382d85f9ca62e8bf3372b6b99038e72534
-
SSDEEP
12288:TNodBiTI+TpqA6EZO7KUQRZ66z24VZbdrpgrXN2LWzmidN:ZoPD+Tpq3vKU6Z66z24VZbFpgJ2LWzm+
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 007e15d58faf04f5c0875d202e3100e3.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon6.ico 007e15d58faf04f5c0875d202e3100e3.exe File created C:\Windows\bugMAKER.bat 007e15d58faf04f5c0875d202e3100e3.exe File created C:\Windows\winhash_up.exez 007e15d58faf04f5c0875d202e3100e3.exe File created C:\Windows\winhash_up.exe 007e15d58faf04f5c0875d202e3100e3.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 007e15d58faf04f5c0875d202e3100e3.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 007e15d58faf04f5c0875d202e3100e3.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 007e15d58faf04f5c0875d202e3100e3.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 007e15d58faf04f5c0875d202e3100e3.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 007e15d58faf04f5c0875d202e3100e3.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 007e15d58faf04f5c0875d202e3100e3.exe File opened for modification C:\Windows\winhash_up.exez 007e15d58faf04f5c0875d202e3100e3.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 007e15d58faf04f5c0875d202e3100e3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4188 wrote to memory of 2728 4188 007e15d58faf04f5c0875d202e3100e3.exe 19 PID 4188 wrote to memory of 2728 4188 007e15d58faf04f5c0875d202e3100e3.exe 19 PID 4188 wrote to memory of 2728 4188 007e15d58faf04f5c0875d202e3100e3.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\007e15d58faf04f5c0875d202e3100e3.exe"C:\Users\Admin\AppData\Local\Temp\007e15d58faf04f5c0875d202e3100e3.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵PID:2728
-