Analysis
-
max time kernel
120s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 10:13
Static task
static1
Behavioral task
behavioral1
Sample
1587d19f5c42de9e2e05a5125c9f623e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1587d19f5c42de9e2e05a5125c9f623e.exe
Resource
win10v2004-20231215-en
General
-
Target
1587d19f5c42de9e2e05a5125c9f623e.exe
-
Size
218KB
-
MD5
1587d19f5c42de9e2e05a5125c9f623e
-
SHA1
86604fc11d08ee2b9178ba8b7008c1163b835832
-
SHA256
24e25023541fe76fba0ecb1a4faf846eac1cd6da183ac6383338c107969a7072
-
SHA512
bdaa1bb1c84ae18458cc2d1faf017fba13c34cb027507edef2ce16d6595e9eaad0be47bb42db8e32b67c17858d4f46fc095eb5fe3dfe485f7b082bc014d4819c
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B8Ltka7pj0kgP:o68i3odBiTl2+TCU/ytkG0k8P
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 1587d19f5c42de9e2e05a5125c9f623e.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\bugMAKER.bat 1587d19f5c42de9e2e05a5125c9f623e.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 1587d19f5c42de9e2e05a5125c9f623e.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 1587d19f5c42de9e2e05a5125c9f623e.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 1587d19f5c42de9e2e05a5125c9f623e.exe File created C:\Windows\SHARE_TEMP\Icon13.ico 1587d19f5c42de9e2e05a5125c9f623e.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 1587d19f5c42de9e2e05a5125c9f623e.exe File created C:\Windows\winhash_up.exez 1587d19f5c42de9e2e05a5125c9f623e.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 1587d19f5c42de9e2e05a5125c9f623e.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 1587d19f5c42de9e2e05a5125c9f623e.exe File created C:\Windows\winhash_up.exe 1587d19f5c42de9e2e05a5125c9f623e.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 1587d19f5c42de9e2e05a5125c9f623e.exe File opened for modification C:\Windows\winhash_up.exez 1587d19f5c42de9e2e05a5125c9f623e.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 1587d19f5c42de9e2e05a5125c9f623e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2844 2332 1587d19f5c42de9e2e05a5125c9f623e.exe 28 PID 2332 wrote to memory of 2844 2332 1587d19f5c42de9e2e05a5125c9f623e.exe 28 PID 2332 wrote to memory of 2844 2332 1587d19f5c42de9e2e05a5125c9f623e.exe 28 PID 2332 wrote to memory of 2844 2332 1587d19f5c42de9e2e05a5125c9f623e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1587d19f5c42de9e2e05a5125c9f623e.exe"C:\Users\Admin\AppData\Local\Temp\1587d19f5c42de9e2e05a5125c9f623e.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD50fa1d12f55e06a556c082d481fb94d6c
SHA195d703b895ab736bf0bbd09978b9d81673353779
SHA2568d38bc66c8066e4fff0577a4bb8249a7e999fea89c6d6596513dae76668cdb0f
SHA51222af528f9ccff6f070e467dd879e49e286cf3dc72174cb5eb7abb988edaccacb5861cfa7ca47fd57bd2e9fd53c4ca145d1e26950be05b6b480441f9f21fa3056