Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 03:09
Static task
static1
Behavioral task
behavioral1
Sample
25d3b5c19554b5b572cfbcf26b43552a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
25d3b5c19554b5b572cfbcf26b43552a.exe
Resource
win10v2004-20231215-en
General
-
Target
25d3b5c19554b5b572cfbcf26b43552a.exe
-
Size
163KB
-
MD5
25d3b5c19554b5b572cfbcf26b43552a
-
SHA1
c03c0337fa31dc8c98d16a17a421f3c59c1802aa
-
SHA256
8d8bc92b282cca14b8ea675f13ca29ab431a68a75a0a48f0f86b97c0af1aac4a
-
SHA512
dffb57c17ee2376e2ffc876e976534ddc1c70358271b331b2cc393ac03865feb53aa0caec260c6c7481bfa7fea7b47554df1103c4fc1b6897f75e6f1f1ca743b
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e89:o68i3odBiTl2+TCU/f
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 25d3b5c19554b5b572cfbcf26b43552a.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File opened for modification C:\Windows\winhash_up.exez 25d3b5c19554b5b572cfbcf26b43552a.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 25d3b5c19554b5b572cfbcf26b43552a.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 25d3b5c19554b5b572cfbcf26b43552a.exe File created C:\Windows\SHARE_TEMP\Icon13.ico 25d3b5c19554b5b572cfbcf26b43552a.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 25d3b5c19554b5b572cfbcf26b43552a.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 25d3b5c19554b5b572cfbcf26b43552a.exe File created C:\Windows\winhash_up.exe 25d3b5c19554b5b572cfbcf26b43552a.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 25d3b5c19554b5b572cfbcf26b43552a.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 25d3b5c19554b5b572cfbcf26b43552a.exe File created C:\Windows\winhash_up.exez 25d3b5c19554b5b572cfbcf26b43552a.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 25d3b5c19554b5b572cfbcf26b43552a.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 25d3b5c19554b5b572cfbcf26b43552a.exe File created C:\Windows\bugMAKER.bat 25d3b5c19554b5b572cfbcf26b43552a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2692 1684 25d3b5c19554b5b572cfbcf26b43552a.exe 27 PID 1684 wrote to memory of 2692 1684 25d3b5c19554b5b572cfbcf26b43552a.exe 27 PID 1684 wrote to memory of 2692 1684 25d3b5c19554b5b572cfbcf26b43552a.exe 27 PID 1684 wrote to memory of 2692 1684 25d3b5c19554b5b572cfbcf26b43552a.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\25d3b5c19554b5b572cfbcf26b43552a.exe"C:\Users\Admin\AppData\Local\Temp\25d3b5c19554b5b572cfbcf26b43552a.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD5975f99c2481824741894e11cbb6261e1
SHA117279796f96055d79110b063d517e2f2015456ad
SHA256f0a5bf434505cadacd08d5cde58a5ce92a7d9642fa667471ff774136cde184a1
SHA5128c0047d08c5ec11655383ffffc0a3b6512591aa81f0d54f1d4460be73dbcc31e86fdee97dca360a5d8dbf37867e1bd6c8a49046ed9db1d1a36f31dc73ad2d318