Analysis
-
max time kernel
0s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
01/01/2024, 16:54
Static task
static1
Behavioral task
behavioral1
Sample
3d6147a30c75eea8a690ab20304aa1fb.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3d6147a30c75eea8a690ab20304aa1fb.exe
Resource
win10v2004-20231222-en
General
-
Target
3d6147a30c75eea8a690ab20304aa1fb.exe
-
Size
161KB
-
MD5
3d6147a30c75eea8a690ab20304aa1fb
-
SHA1
8767f787284c676dc5b0c7da4722edefeec25751
-
SHA256
6d359ec5ff8c404313fa4fe41bd727acd5e677a90a26ed7dba42d994f3ea2492
-
SHA512
0d376e6d57170dbaaadba4683a1069655a3d4e9ef7cc3f187e8ae0581ce8695961616416aa7eaafb15860b18b7664067cff46461eedc72ad533a89375228a9b8
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B8c:o68i3odBiTl2+TCU/1
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 3d6147a30c75eea8a690ab20304aa1fb.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon6.ico 3d6147a30c75eea8a690ab20304aa1fb.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 3d6147a30c75eea8a690ab20304aa1fb.exe File created C:\Windows\bugMAKER.bat 3d6147a30c75eea8a690ab20304aa1fb.exe File created C:\Windows\winhash_up.exez 3d6147a30c75eea8a690ab20304aa1fb.exe File opened for modification C:\Windows\winhash_up.exez 3d6147a30c75eea8a690ab20304aa1fb.exe File created C:\Windows\winhash_up.exe 3d6147a30c75eea8a690ab20304aa1fb.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 3d6147a30c75eea8a690ab20304aa1fb.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 3d6147a30c75eea8a690ab20304aa1fb.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 3d6147a30c75eea8a690ab20304aa1fb.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 3d6147a30c75eea8a690ab20304aa1fb.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 3d6147a30c75eea8a690ab20304aa1fb.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 3d6147a30c75eea8a690ab20304aa1fb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2888 wrote to memory of 824 2888 3d6147a30c75eea8a690ab20304aa1fb.exe 20 PID 2888 wrote to memory of 824 2888 3d6147a30c75eea8a690ab20304aa1fb.exe 20 PID 2888 wrote to memory of 824 2888 3d6147a30c75eea8a690ab20304aa1fb.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d6147a30c75eea8a690ab20304aa1fb.exe"C:\Users\Admin\AppData\Local\Temp\3d6147a30c75eea8a690ab20304aa1fb.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵PID:824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD51be1a11721fc2d0ccfb16cc328bdeca8
SHA146003101f60b5005a17e010cbed062760e5ee10c
SHA2567aedb5b2022f90d414f0f16eac4c0d07e23499c5ef577745bcf4939e6779dbc4
SHA512baa088805b7ab7ccb42dddb1cae436753f29857333d0129ece49064829980c1edb07bffd3093443db46a3730a2d9faf07dd9ccf24f388f93a6c7115d7b8d9a7a