Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13-01-2024 00:41
Static task
static1
Behavioral task
behavioral1
Sample
578833b4e096585b47b29a7b5f38b5ba.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
578833b4e096585b47b29a7b5f38b5ba.exe
Resource
win10v2004-20231215-en
General
-
Target
578833b4e096585b47b29a7b5f38b5ba.exe
-
Size
202KB
-
MD5
578833b4e096585b47b29a7b5f38b5ba
-
SHA1
3e46590cb58e2f25b71003193276a69a79853405
-
SHA256
dd925176ab14e7fa8dee125e13da0c29a698824adfc8bdae59ef448e1fdef658
-
SHA512
ec68da68a749a141a10e2d1c1c544118028c1bb51c2858662dd3ec8971d0fd01319e12875ee47412bb215a78c36f870bbca587ed0d816ca51376f16248d66b78
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8FpVpwpjH:o68i3odBiTl2+TCU/8H
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 578833b4e096585b47b29a7b5f38b5ba.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\bugMAKER.bat 578833b4e096585b47b29a7b5f38b5ba.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 578833b4e096585b47b29a7b5f38b5ba.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 578833b4e096585b47b29a7b5f38b5ba.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 578833b4e096585b47b29a7b5f38b5ba.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 578833b4e096585b47b29a7b5f38b5ba.exe File opened for modification C:\Windows\winhash_up.exez 578833b4e096585b47b29a7b5f38b5ba.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 578833b4e096585b47b29a7b5f38b5ba.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 578833b4e096585b47b29a7b5f38b5ba.exe File created C:\Windows\winhash_up.exez 578833b4e096585b47b29a7b5f38b5ba.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 578833b4e096585b47b29a7b5f38b5ba.exe File created C:\Windows\SHARE_TEMP\Icon13.ico 578833b4e096585b47b29a7b5f38b5ba.exe File created C:\Windows\winhash_up.exe 578833b4e096585b47b29a7b5f38b5ba.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 578833b4e096585b47b29a7b5f38b5ba.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2800 2900 578833b4e096585b47b29a7b5f38b5ba.exe 28 PID 2900 wrote to memory of 2800 2900 578833b4e096585b47b29a7b5f38b5ba.exe 28 PID 2900 wrote to memory of 2800 2900 578833b4e096585b47b29a7b5f38b5ba.exe 28 PID 2900 wrote to memory of 2800 2900 578833b4e096585b47b29a7b5f38b5ba.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\578833b4e096585b47b29a7b5f38b5ba.exe"C:\Users\Admin\AppData\Local\Temp\578833b4e096585b47b29a7b5f38b5ba.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD5b5df19cd97d700b7c97e6e26aba1562c
SHA11004fa04f8f247957c8363c0d4dd7c4dcad28ce2
SHA2560e92763db273b573d7cc392689e4e6bd985a9e6807c8d12505935db33493f429
SHA51256f21e084fec83f22c925eae0a78a2c5f600f44aa57c39ca0677f27d02070510003d0ba727eab506bb3da059647cf58a2e293e2bc94b709a2d1f51e269341d95