Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 21:23
Static task
static1
Behavioral task
behavioral1
Sample
1cdc246237fb941660d618cb38d4067e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1cdc246237fb941660d618cb38d4067e.exe
Resource
win10v2004-20231215-en
General
-
Target
1cdc246237fb941660d618cb38d4067e.exe
-
Size
164KB
-
MD5
1cdc246237fb941660d618cb38d4067e
-
SHA1
f0ec3973fa4aa1b9a5fa9085a3f5cbfff78c0fed
-
SHA256
8e9f59329cdf05422c1b024e9ec1e58abc2b845ebef9d8f674f917544dc171b6
-
SHA512
58e11b9b49fcb46cdee594ec7cca7c1a477b0e057bba627cde1d947f41ff70cdf7b4707a229ee1bdacef30e18f8461645cfe93e55832237449fd0fb5fd6f80fc
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B8M:o68i3odBiTl2+TCU/3
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 1cdc246237fb941660d618cb38d4067e.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon2.ico 1cdc246237fb941660d618cb38d4067e.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 1cdc246237fb941660d618cb38d4067e.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 1cdc246237fb941660d618cb38d4067e.exe File created C:\Windows\SHARE_TEMP\Icon13.ico 1cdc246237fb941660d618cb38d4067e.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 1cdc246237fb941660d618cb38d4067e.exe File created C:\Windows\winhash_up.exez 1cdc246237fb941660d618cb38d4067e.exe File created C:\Windows\winhash_up.exe 1cdc246237fb941660d618cb38d4067e.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 1cdc246237fb941660d618cb38d4067e.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 1cdc246237fb941660d618cb38d4067e.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 1cdc246237fb941660d618cb38d4067e.exe File opened for modification C:\Windows\winhash_up.exez 1cdc246237fb941660d618cb38d4067e.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 1cdc246237fb941660d618cb38d4067e.exe File created C:\Windows\bugMAKER.bat 1cdc246237fb941660d618cb38d4067e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2704 2640 1cdc246237fb941660d618cb38d4067e.exe 28 PID 2640 wrote to memory of 2704 2640 1cdc246237fb941660d618cb38d4067e.exe 28 PID 2640 wrote to memory of 2704 2640 1cdc246237fb941660d618cb38d4067e.exe 28 PID 2640 wrote to memory of 2704 2640 1cdc246237fb941660d618cb38d4067e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1cdc246237fb941660d618cb38d4067e.exe"C:\Users\Admin\AppData\Local\Temp\1cdc246237fb941660d618cb38d4067e.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD5b9ea7ddaec5f771424b8d828a444207d
SHA18a8aa5a35bd466675eb4296167ec788f0962ae68
SHA2563af117b84c58c3e2a37f56bc51ccbe5c1452238951a2f38f0a6cfebc9a1a00e2
SHA51208373965ea0a33bc049c85a055cf964abf78d01bf61bdecf96a43524651a017c35df3ebfb924b76e356f9ef74c10e7dece4b95831cd37af28b42164c6be1066a