Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 07:51
Static task
static1
Behavioral task
behavioral1
Sample
12a53c805e1d1f33bb665846ff485ae9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
12a53c805e1d1f33bb665846ff485ae9.exe
Resource
win10v2004-20231222-en
General
-
Target
12a53c805e1d1f33bb665846ff485ae9.exe
-
Size
255KB
-
MD5
12a53c805e1d1f33bb665846ff485ae9
-
SHA1
1c5bd6c330e67b18302d7ab8cd761f2fbb70fdd7
-
SHA256
3c9a4a421ee5d347dc3dc70b31327befcf80171e04ef7af85aafc83d548da93d
-
SHA512
289a778496fd1ddb331387da24e9b5462ddeb2cf09e604cda2385d03de112b4ed4539071c344bf8b78c779cd87585d94fff7c0e6bdca977f4ad28439e7b4eaa6
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8bpjBFy11Awu:o68i3odBiTl2+TCU/zhuhuIpRL5uOe
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 12a53c805e1d1f33bb665846ff485ae9.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon7.ico 12a53c805e1d1f33bb665846ff485ae9.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 12a53c805e1d1f33bb665846ff485ae9.exe File created C:\Windows\winhash_up.exe 12a53c805e1d1f33bb665846ff485ae9.exe File created C:\Windows\SHARE_TEMP\Icon13.ico 12a53c805e1d1f33bb665846ff485ae9.exe File created C:\Windows\winhash_up.exez 12a53c805e1d1f33bb665846ff485ae9.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 12a53c805e1d1f33bb665846ff485ae9.exe File created C:\Windows\bugMAKER.bat 12a53c805e1d1f33bb665846ff485ae9.exe File opened for modification C:\Windows\winhash_up.exez 12a53c805e1d1f33bb665846ff485ae9.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 12a53c805e1d1f33bb665846ff485ae9.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 12a53c805e1d1f33bb665846ff485ae9.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 12a53c805e1d1f33bb665846ff485ae9.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 12a53c805e1d1f33bb665846ff485ae9.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 12a53c805e1d1f33bb665846ff485ae9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2972 2532 12a53c805e1d1f33bb665846ff485ae9.exe 21 PID 2532 wrote to memory of 2972 2532 12a53c805e1d1f33bb665846ff485ae9.exe 21 PID 2532 wrote to memory of 2972 2532 12a53c805e1d1f33bb665846ff485ae9.exe 21 PID 2532 wrote to memory of 2972 2532 12a53c805e1d1f33bb665846ff485ae9.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\12a53c805e1d1f33bb665846ff485ae9.exe"C:\Users\Admin\AppData\Local\Temp\12a53c805e1d1f33bb665846ff485ae9.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD5a857cfb60ce4aec17a44258dea96b6ed
SHA1391c84705d0fff144882e3091ee083785363969a
SHA2566fbbf97a3cacd73caa368b67ba3697ddd362c2aab599a48600cb3ccd5ceec02f
SHA512cfc05796c97b6d8d13c1da0f0a11ac964e3750f18ad445fa16de4e95a43b6611b861754308371392a8c35c012be63a82c8fdb0337adbc4da18485a2eb471155d