Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
17/01/2024, 19:29
Static task
static1
Behavioral task
behavioral1
Sample
63691f8e1346e069e1f6b0d57d21ff26.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
63691f8e1346e069e1f6b0d57d21ff26.exe
Resource
win10v2004-20231222-en
General
-
Target
63691f8e1346e069e1f6b0d57d21ff26.exe
-
Size
229KB
-
MD5
63691f8e1346e069e1f6b0d57d21ff26
-
SHA1
24a173a2555510732e67c510733278e257d561bb
-
SHA256
78053e0b64756cacd200eca560db10a5c215a909ba32ca453d09a4f45d62146c
-
SHA512
cecdcc6af4f7f8333a6d79ba90df5374c5e2b52fb833e585c540712e1b7cf73acd00a6c90c9245718bff2b5f313d06bec34e1a8860e2e9c00b7a989e0b48b622
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8qtkaZgxktEv:o68i3odBiTl2+TCU/MtkqxrqLckP+6
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 63691f8e1346e069e1f6b0d57d21ff26.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon14.ico 63691f8e1346e069e1f6b0d57d21ff26.exe File created C:\Windows\winhash_up.exez 63691f8e1346e069e1f6b0d57d21ff26.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 63691f8e1346e069e1f6b0d57d21ff26.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 63691f8e1346e069e1f6b0d57d21ff26.exe File created C:\Windows\SHARE_TEMP\Icon13.ico 63691f8e1346e069e1f6b0d57d21ff26.exe File created C:\Windows\bugMAKER.bat 63691f8e1346e069e1f6b0d57d21ff26.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 63691f8e1346e069e1f6b0d57d21ff26.exe File created C:\Windows\winhash_up.exe 63691f8e1346e069e1f6b0d57d21ff26.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 63691f8e1346e069e1f6b0d57d21ff26.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 63691f8e1346e069e1f6b0d57d21ff26.exe File opened for modification C:\Windows\winhash_up.exez 63691f8e1346e069e1f6b0d57d21ff26.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 63691f8e1346e069e1f6b0d57d21ff26.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 63691f8e1346e069e1f6b0d57d21ff26.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2664 2148 63691f8e1346e069e1f6b0d57d21ff26.exe 28 PID 2148 wrote to memory of 2664 2148 63691f8e1346e069e1f6b0d57d21ff26.exe 28 PID 2148 wrote to memory of 2664 2148 63691f8e1346e069e1f6b0d57d21ff26.exe 28 PID 2148 wrote to memory of 2664 2148 63691f8e1346e069e1f6b0d57d21ff26.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\63691f8e1346e069e1f6b0d57d21ff26.exe"C:\Users\Admin\AppData\Local\Temp\63691f8e1346e069e1f6b0d57d21ff26.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:2664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD5d9796143b7e07144fd8e3d126d23f637
SHA1d19582b06f29ac3d1534f36e079b8742c98feead
SHA2567f564de6dca2bbdf7b8bbfe7db87a907de19aed5c30ea818192fef49b4326d74
SHA5120976aeaa962df56a39c5468cf31f6c351d69a35bda6009efb00273c7b9702fa2d4c1a9ac150008b983e58590d072bb60e906a56eacb4ff234c069ed5504c9d49