Analysis
-
max time kernel
0s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 04:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2748c646a5977e3b7585640486645c69.exe
Resource
win7-20231129-en
windows7-x64
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
2748c646a5977e3b7585640486645c69.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
2748c646a5977e3b7585640486645c69.exe
-
Size
164KB
-
MD5
2748c646a5977e3b7585640486645c69
-
SHA1
6c98baf04bd2f9eebd3d7a64a2e583375b6aeab0
-
SHA256
3e0c3676a2933d5293af8a9313e12b83f8dca0dc6a7ef99f4aad21d1aa331a2e
-
SHA512
5df53365d170703c5002350c78d25e356e291459ff15075d8f915f35efabb1563fdd70957c033942c36f3b21792d917034b3ecfd0e3f67a0cbef30387142dad8
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B8g:o68i3odBiTl2+TCU/T
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 2748c646a5977e3b7585640486645c69.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\winhash_up.exe 2748c646a5977e3b7585640486645c69.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 2748c646a5977e3b7585640486645c69.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 2748c646a5977e3b7585640486645c69.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 2748c646a5977e3b7585640486645c69.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 2748c646a5977e3b7585640486645c69.exe File created C:\Windows\bugMAKER.bat 2748c646a5977e3b7585640486645c69.exe File created C:\Windows\winhash_up.exez 2748c646a5977e3b7585640486645c69.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 2748c646a5977e3b7585640486645c69.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 2748c646a5977e3b7585640486645c69.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 2748c646a5977e3b7585640486645c69.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 2748c646a5977e3b7585640486645c69.exe File opened for modification C:\Windows\winhash_up.exez 2748c646a5977e3b7585640486645c69.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1232 wrote to memory of 4760 1232 2748c646a5977e3b7585640486645c69.exe 18 PID 1232 wrote to memory of 4760 1232 2748c646a5977e3b7585640486645c69.exe 18 PID 1232 wrote to memory of 4760 1232 2748c646a5977e3b7585640486645c69.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\2748c646a5977e3b7585640486645c69.exe"C:\Users\Admin\AppData\Local\Temp\2748c646a5977e3b7585640486645c69.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵PID:4760
-