Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 14:47
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4e94d8a749c23c58b471f0dd03723705.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
4e94d8a749c23c58b471f0dd03723705.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
4e94d8a749c23c58b471f0dd03723705.exe
-
Size
192KB
-
MD5
4e94d8a749c23c58b471f0dd03723705
-
SHA1
40ac4babccbe8fd462db982a2c04aa7715d32e5b
-
SHA256
0c00442776b79c8ffac4738e720695cbc400c005debc4a433c9c10c5905e135a
-
SHA512
43395369657e59009efe698b433e03ca6d8a1dcae1d7e2cfe55da547ea7a26c1c764d366600cb440fa288c31f58d0c460f265ac060d0540f681ca60759d7bef6
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8tFkZ:o68i3odBiTl2+TCU/TFkZ
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 4e94d8a749c23c58b471f0dd03723705.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File opened for modification C:\Windows\winhash_up.exez 4e94d8a749c23c58b471f0dd03723705.exe File created C:\Windows\winhash_up.exe 4e94d8a749c23c58b471f0dd03723705.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 4e94d8a749c23c58b471f0dd03723705.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 4e94d8a749c23c58b471f0dd03723705.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 4e94d8a749c23c58b471f0dd03723705.exe File created C:\Windows\bugMAKER.bat 4e94d8a749c23c58b471f0dd03723705.exe File created C:\Windows\winhash_up.exez 4e94d8a749c23c58b471f0dd03723705.exe File created C:\Windows\SHARE_TEMP\Icon13.ico 4e94d8a749c23c58b471f0dd03723705.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 4e94d8a749c23c58b471f0dd03723705.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 4e94d8a749c23c58b471f0dd03723705.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 4e94d8a749c23c58b471f0dd03723705.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 4e94d8a749c23c58b471f0dd03723705.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 4e94d8a749c23c58b471f0dd03723705.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1776 wrote to memory of 2276 1776 4e94d8a749c23c58b471f0dd03723705.exe 16 PID 1776 wrote to memory of 2276 1776 4e94d8a749c23c58b471f0dd03723705.exe 16 PID 1776 wrote to memory of 2276 1776 4e94d8a749c23c58b471f0dd03723705.exe 16 PID 1776 wrote to memory of 2276 1776 4e94d8a749c23c58b471f0dd03723705.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e94d8a749c23c58b471f0dd03723705.exe"C:\Users\Admin\AppData\Local\Temp\4e94d8a749c23c58b471f0dd03723705.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:2276
-