Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14-01-2024 18:10
Static task
static1
Behavioral task
behavioral1
Sample
5b82727d43201bbaef303c15e2cfdfef.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5b82727d43201bbaef303c15e2cfdfef.exe
Resource
win10v2004-20231222-en
General
-
Target
5b82727d43201bbaef303c15e2cfdfef.exe
-
Size
224KB
-
MD5
5b82727d43201bbaef303c15e2cfdfef
-
SHA1
d139038af3eddbc8ea5cc4845273dca94272a8ae
-
SHA256
c0a5ea404ff8856b627f918599d6dae5a7964a451968ea36ebb31575cf937a90
-
SHA512
e7aa4d463c2438d6fe5f16e79e608dd0a0dbff8eee1f933eb1a887988363f953c826a04de4c1d5df3b5fe4a61dbc448dc5f7c3c785b81fe8fc7f89c460b11712
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B8ypjBFy11Aw6:o68i3odBiTl2+TCU/phuhuIpRLe
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 5b82727d43201bbaef303c15e2cfdfef.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon6.ico 5b82727d43201bbaef303c15e2cfdfef.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 5b82727d43201bbaef303c15e2cfdfef.exe File opened for modification C:\Windows\winhash_up.exez 5b82727d43201bbaef303c15e2cfdfef.exe File created C:\Windows\winhash_up.exe 5b82727d43201bbaef303c15e2cfdfef.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 5b82727d43201bbaef303c15e2cfdfef.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 5b82727d43201bbaef303c15e2cfdfef.exe File created C:\Windows\SHARE_TEMP\Icon13.ico 5b82727d43201bbaef303c15e2cfdfef.exe File created C:\Windows\winhash_up.exez 5b82727d43201bbaef303c15e2cfdfef.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 5b82727d43201bbaef303c15e2cfdfef.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 5b82727d43201bbaef303c15e2cfdfef.exe File created C:\Windows\bugMAKER.bat 5b82727d43201bbaef303c15e2cfdfef.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 5b82727d43201bbaef303c15e2cfdfef.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 5b82727d43201bbaef303c15e2cfdfef.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1768 wrote to memory of 2712 1768 5b82727d43201bbaef303c15e2cfdfef.exe 28 PID 1768 wrote to memory of 2712 1768 5b82727d43201bbaef303c15e2cfdfef.exe 28 PID 1768 wrote to memory of 2712 1768 5b82727d43201bbaef303c15e2cfdfef.exe 28 PID 1768 wrote to memory of 2712 1768 5b82727d43201bbaef303c15e2cfdfef.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b82727d43201bbaef303c15e2cfdfef.exe"C:\Users\Admin\AppData\Local\Temp\5b82727d43201bbaef303c15e2cfdfef.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD59845de5c61db85b016e29ffdf34709f3
SHA12e0084d7a9861ff3d6c990501b6fcf70f52d8517
SHA256ca76c9f4e16bbc40526e66161517d2a7c4bed2ae0b5df0fde90fcec28521ba45
SHA5129327fbcfb6d6520734a386ca47ccf70d3b9bdf1582d43fe50b13c1c34047541f36d59f215ac3479caf4efe72f6f43e1c63c9de6c9c8584ed1dbb81d6c6f17549