Analysis
-
max time kernel
0s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 05:40
Static task
static1
Behavioral task
behavioral1
Sample
4fbbbe153b596ec96ca00143fb38c8ad.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4fbbbe153b596ec96ca00143fb38c8ad.exe
Resource
win10v2004-20231222-en
General
-
Target
4fbbbe153b596ec96ca00143fb38c8ad.exe
-
Size
198KB
-
MD5
4fbbbe153b596ec96ca00143fb38c8ad
-
SHA1
852ea3e909c8a9b262262664758567b052a68d7c
-
SHA256
55b6de5f4cc270d44f2e37767d13ea772202d5904136d1305baf1a8bd608e1ab
-
SHA512
957b86e2abfcd279bbb49c29aca93b3014833835b4a3b9ba9829e6ee5a62e3d04f6cb12aab34b25d6a15b883950ecafcfb5be7230edf535ea00521fec284affa
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B8mkgnYO:o68i3odBiTl2+TCU/Tk8d
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 4fbbbe153b596ec96ca00143fb38c8ad.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon10.ico 4fbbbe153b596ec96ca00143fb38c8ad.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 4fbbbe153b596ec96ca00143fb38c8ad.exe File created C:\Windows\bugMAKER.bat 4fbbbe153b596ec96ca00143fb38c8ad.exe File created C:\Windows\winhash_up.exez 4fbbbe153b596ec96ca00143fb38c8ad.exe File opened for modification C:\Windows\winhash_up.exez 4fbbbe153b596ec96ca00143fb38c8ad.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 4fbbbe153b596ec96ca00143fb38c8ad.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 4fbbbe153b596ec96ca00143fb38c8ad.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 4fbbbe153b596ec96ca00143fb38c8ad.exe File created C:\Windows\winhash_up.exe 4fbbbe153b596ec96ca00143fb38c8ad.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 4fbbbe153b596ec96ca00143fb38c8ad.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 4fbbbe153b596ec96ca00143fb38c8ad.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 4fbbbe153b596ec96ca00143fb38c8ad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3544 wrote to memory of 1684 3544 4fbbbe153b596ec96ca00143fb38c8ad.exe 18 PID 3544 wrote to memory of 1684 3544 4fbbbe153b596ec96ca00143fb38c8ad.exe 18 PID 3544 wrote to memory of 1684 3544 4fbbbe153b596ec96ca00143fb38c8ad.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fbbbe153b596ec96ca00143fb38c8ad.exe"C:\Users\Admin\AppData\Local\Temp\4fbbbe153b596ec96ca00143fb38c8ad.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵PID:1684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD543c85308b3521c5edc2fc74c5f4629d3
SHA1cdcd65495d0f60c78e4ffb0e9432a3ec292ae5ab
SHA256829ba5640530d95f79abe69e953217673dbe37b7f54026ca65c12c65ef7e5f80
SHA512d422f2fed6d274301b39348cb87282c9ec55292be218bf9d09d9309857d2706a34e749a1997a186160468ab24933ca774df1627b5fb68bb66c429ab1618b90c3