Analysis
-
max time kernel
119s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04-01-2024 12:10
Static task
static1
Behavioral task
behavioral1
Sample
40d2af967b3afe59eff115b24d1753e5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
40d2af967b3afe59eff115b24d1753e5.exe
Resource
win10v2004-20231215-en
General
-
Target
40d2af967b3afe59eff115b24d1753e5.exe
-
Size
202KB
-
MD5
40d2af967b3afe59eff115b24d1753e5
-
SHA1
2e7b2ab82e199a4be4302091db1b844cd91dd402
-
SHA256
b04cb415c3d2e04d4671687f3a1f028e6c2e2bd8dccf176db47f15f28e44118d
-
SHA512
7ce7ed9e2be1db2e45d8950c05797c8fc1007dfa6eaea89aa628a9ea23ce0c7677502f3cd256f9381c31be4ef567bca5286c476e87cccb2409f87090f2a41057
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8FpwtkaZgxkz:o68i3odBiTl2+TCU/6tkqz
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 40d2af967b3afe59eff115b24d1753e5.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon10.ico 40d2af967b3afe59eff115b24d1753e5.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 40d2af967b3afe59eff115b24d1753e5.exe File opened for modification C:\Windows\winhash_up.exez 40d2af967b3afe59eff115b24d1753e5.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 40d2af967b3afe59eff115b24d1753e5.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 40d2af967b3afe59eff115b24d1753e5.exe File created C:\Windows\winhash_up.exez 40d2af967b3afe59eff115b24d1753e5.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 40d2af967b3afe59eff115b24d1753e5.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 40d2af967b3afe59eff115b24d1753e5.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 40d2af967b3afe59eff115b24d1753e5.exe File created C:\Windows\SHARE_TEMP\Icon13.ico 40d2af967b3afe59eff115b24d1753e5.exe File created C:\Windows\bugMAKER.bat 40d2af967b3afe59eff115b24d1753e5.exe File created C:\Windows\winhash_up.exe 40d2af967b3afe59eff115b24d1753e5.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 40d2af967b3afe59eff115b24d1753e5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1904 wrote to memory of 3008 1904 40d2af967b3afe59eff115b24d1753e5.exe 29 PID 1904 wrote to memory of 3008 1904 40d2af967b3afe59eff115b24d1753e5.exe 29 PID 1904 wrote to memory of 3008 1904 40d2af967b3afe59eff115b24d1753e5.exe 29 PID 1904 wrote to memory of 3008 1904 40d2af967b3afe59eff115b24d1753e5.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\40d2af967b3afe59eff115b24d1753e5.exe"C:\Users\Admin\AppData\Local\Temp\40d2af967b3afe59eff115b24d1753e5.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD58d07c1cb050c05101c30e99445773443
SHA1ca0675f56dfde35ac5b201e42ef60a1c7947e284
SHA25694bc1f3641cac1966f47887800beaddcd0d263b4bdde7b46edc105ba02524e5b
SHA512204712f86446fadb12abc5322ab52e378a15dbac9efc2270ad19c63591c9b69955487e311587c08ed1331f6076c3bf0b7d1ac473cd286008a2b413e0534e86de