Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01-01-2024 20:07
Static task
static1
Behavioral task
behavioral1
Sample
3dc37060f723abc70e705b1ad10c99d7.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3dc37060f723abc70e705b1ad10c99d7.exe
Resource
win10v2004-20231215-en
General
-
Target
3dc37060f723abc70e705b1ad10c99d7.exe
-
Size
236KB
-
MD5
3dc37060f723abc70e705b1ad10c99d7
-
SHA1
e36014547c4d028c7f33f2bacf4285ba70c4608c
-
SHA256
fd04a9f19e5f2ed33c65ba599037d3f26b1e24a4f4595d24f4c6ad641935b15c
-
SHA512
51a9b703a7275c3614c452d8bb9bfe2b4dcbeea7a5b7aaddd32b67d6d7e62028cd30e5d90fee5a0ccc8b27b00c179a5c2ef8f7339972ba9a126d42d9b2c03db7
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8FpVpwpjBtkC:o68i3odBiTl2+TCU/8Pk8Z
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 3dc37060f723abc70e705b1ad10c99d7.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon10.ico 3dc37060f723abc70e705b1ad10c99d7.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 3dc37060f723abc70e705b1ad10c99d7.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 3dc37060f723abc70e705b1ad10c99d7.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 3dc37060f723abc70e705b1ad10c99d7.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 3dc37060f723abc70e705b1ad10c99d7.exe File created C:\Windows\SHARE_TEMP\Icon13.ico 3dc37060f723abc70e705b1ad10c99d7.exe File created C:\Windows\winhash_up.exez 3dc37060f723abc70e705b1ad10c99d7.exe File created C:\Windows\winhash_up.exe 3dc37060f723abc70e705b1ad10c99d7.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 3dc37060f723abc70e705b1ad10c99d7.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 3dc37060f723abc70e705b1ad10c99d7.exe File created C:\Windows\bugMAKER.bat 3dc37060f723abc70e705b1ad10c99d7.exe File opened for modification C:\Windows\winhash_up.exez 3dc37060f723abc70e705b1ad10c99d7.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 3dc37060f723abc70e705b1ad10c99d7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2252 2372 3dc37060f723abc70e705b1ad10c99d7.exe 28 PID 2372 wrote to memory of 2252 2372 3dc37060f723abc70e705b1ad10c99d7.exe 28 PID 2372 wrote to memory of 2252 2372 3dc37060f723abc70e705b1ad10c99d7.exe 28 PID 2372 wrote to memory of 2252 2372 3dc37060f723abc70e705b1ad10c99d7.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3dc37060f723abc70e705b1ad10c99d7.exe"C:\Users\Admin\AppData\Local\Temp\3dc37060f723abc70e705b1ad10c99d7.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD508e512ae29853439cdb0122b08dd718d
SHA1ea634c043229911a425570eba403fdf020f1216d
SHA2566465732b01a07ddc8c22f288a622e5cb62c8b5a74279db3e624906337079f5c2
SHA512d39e04269789c2423c77e0d462fa034a9e21d587de273c8e43a5e4c1a2dba1afd7e8a820b540bfe87a67843340f719311f2bcd139d9ed35b527bb2ab9de0546a