Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 02:21
Static task
static1
Behavioral task
behavioral1
Sample
5245dde3c49c3adc0ad6a612b91c52e1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5245dde3c49c3adc0ad6a612b91c52e1.exe
Resource
win10v2004-20231222-en
General
-
Target
5245dde3c49c3adc0ad6a612b91c52e1.exe
-
Size
204KB
-
MD5
5245dde3c49c3adc0ad6a612b91c52e1
-
SHA1
d90fe94f31514932fe8b06f2c24e49f1710e7597
-
SHA256
feb935132711e4f515fccb36d2debd5308d0687426fbce750440ba4699a64ab5
-
SHA512
0a6b521f7a7eb0a40c113564489c9d5ebce345951dcf77c7a48330a33db8e3498944bf007fe4088b4825fe54f1ce0f6d9f70e883e9505c4cd16993e85069e17e
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e83tNkgnYU:o68i3odBiTl2+TCU/RtNk8V
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 5245dde3c49c3adc0ad6a612b91c52e1.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\winhash_up.exez 5245dde3c49c3adc0ad6a612b91c52e1.exe File created C:\Windows\winhash_up.exe 5245dde3c49c3adc0ad6a612b91c52e1.exe File opened for modification C:\Windows\winhash_up.exez 5245dde3c49c3adc0ad6a612b91c52e1.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 5245dde3c49c3adc0ad6a612b91c52e1.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 5245dde3c49c3adc0ad6a612b91c52e1.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 5245dde3c49c3adc0ad6a612b91c52e1.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 5245dde3c49c3adc0ad6a612b91c52e1.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 5245dde3c49c3adc0ad6a612b91c52e1.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 5245dde3c49c3adc0ad6a612b91c52e1.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 5245dde3c49c3adc0ad6a612b91c52e1.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 5245dde3c49c3adc0ad6a612b91c52e1.exe File created C:\Windows\SHARE_TEMP\Icon13.ico 5245dde3c49c3adc0ad6a612b91c52e1.exe File created C:\Windows\bugMAKER.bat 5245dde3c49c3adc0ad6a612b91c52e1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2968 2192 5245dde3c49c3adc0ad6a612b91c52e1.exe 18 PID 2192 wrote to memory of 2968 2192 5245dde3c49c3adc0ad6a612b91c52e1.exe 18 PID 2192 wrote to memory of 2968 2192 5245dde3c49c3adc0ad6a612b91c52e1.exe 18 PID 2192 wrote to memory of 2968 2192 5245dde3c49c3adc0ad6a612b91c52e1.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\5245dde3c49c3adc0ad6a612b91c52e1.exe"C:\Users\Admin\AppData\Local\Temp\5245dde3c49c3adc0ad6a612b91c52e1.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD57f3a67a64fae5d97526bff166c4c7196
SHA1fd52125fb6d0e7a4fd0c40c55453d60d8163fabe
SHA25605cf72ea869db7b0d5fbaa6277bed9192aacb7dc035028a686d573523254274f
SHA512c6c1f024b88b526627211c6e5e009784df32c8e8417a71a9a610cb06ec70600d6f50b99fb74b4a21cc33a300e94fcc83808c1191d3d611bad9efcec21ceccca6