Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 16:54
Static task
static1
Behavioral task
behavioral1
Sample
3d6147a30c75eea8a690ab20304aa1fb.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3d6147a30c75eea8a690ab20304aa1fb.exe
Resource
win10v2004-20231222-en
General
-
Target
3d6147a30c75eea8a690ab20304aa1fb.exe
-
Size
161KB
-
MD5
3d6147a30c75eea8a690ab20304aa1fb
-
SHA1
8767f787284c676dc5b0c7da4722edefeec25751
-
SHA256
6d359ec5ff8c404313fa4fe41bd727acd5e677a90a26ed7dba42d994f3ea2492
-
SHA512
0d376e6d57170dbaaadba4683a1069655a3d4e9ef7cc3f187e8ae0581ce8695961616416aa7eaafb15860b18b7664067cff46461eedc72ad533a89375228a9b8
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B8c:o68i3odBiTl2+TCU/1
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 3d6147a30c75eea8a690ab20304aa1fb.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\bugMAKER.bat 3d6147a30c75eea8a690ab20304aa1fb.exe File created C:\Windows\winhash_up.exe 3d6147a30c75eea8a690ab20304aa1fb.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 3d6147a30c75eea8a690ab20304aa1fb.exe File created C:\Windows\SHARE_TEMP\Icon13.ico 3d6147a30c75eea8a690ab20304aa1fb.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 3d6147a30c75eea8a690ab20304aa1fb.exe File created C:\Windows\winhash_up.exez 3d6147a30c75eea8a690ab20304aa1fb.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 3d6147a30c75eea8a690ab20304aa1fb.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 3d6147a30c75eea8a690ab20304aa1fb.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 3d6147a30c75eea8a690ab20304aa1fb.exe File opened for modification C:\Windows\winhash_up.exez 3d6147a30c75eea8a690ab20304aa1fb.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 3d6147a30c75eea8a690ab20304aa1fb.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 3d6147a30c75eea8a690ab20304aa1fb.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 3d6147a30c75eea8a690ab20304aa1fb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2216 wrote to memory of 1944 2216 3d6147a30c75eea8a690ab20304aa1fb.exe 15 PID 2216 wrote to memory of 1944 2216 3d6147a30c75eea8a690ab20304aa1fb.exe 15 PID 2216 wrote to memory of 1944 2216 3d6147a30c75eea8a690ab20304aa1fb.exe 15 PID 2216 wrote to memory of 1944 2216 3d6147a30c75eea8a690ab20304aa1fb.exe 15
Processes
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat1⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\3d6147a30c75eea8a690ab20304aa1fb.exe"C:\Users\Admin\AppData\Local\Temp\3d6147a30c75eea8a690ab20304aa1fb.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD51be1a11721fc2d0ccfb16cc328bdeca8
SHA146003101f60b5005a17e010cbed062760e5ee10c
SHA2567aedb5b2022f90d414f0f16eac4c0d07e23499c5ef577745bcf4939e6779dbc4
SHA512baa088805b7ab7ccb42dddb1cae436753f29857333d0129ece49064829980c1edb07bffd3093443db46a3730a2d9faf07dd9ccf24f388f93a6c7115d7b8d9a7a