Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18-01-2024 16:27
Static task
static1
Behavioral task
behavioral1
Sample
657e059524346d98119bbb19b04ec94e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
657e059524346d98119bbb19b04ec94e.exe
Resource
win10v2004-20231222-en
General
-
Target
657e059524346d98119bbb19b04ec94e.exe
-
Size
235KB
-
MD5
657e059524346d98119bbb19b04ec94e
-
SHA1
f57654adeff09da42ca9e0908504f1cb46d66fb0
-
SHA256
f922a9f7f4d34ce4efe88ad1e7ddfc938d881c1a11139b8c6944894d45c21b74
-
SHA512
a42c459649ebfa62c01d97126f7d37fa2c7705258edfb7e2bf46a9d09676da8e6cf4458ac6e2afe885b96d1bc5c08c7737e6803335e8009dee562260034f2f6c
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8FpSkgnYHfQP:o68i3odBiTl2+TCU/4k8KfQlES
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 657e059524346d98119bbb19b04ec94e.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon5.ico 657e059524346d98119bbb19b04ec94e.exe File opened for modification C:\Windows\winhash_up.exez 657e059524346d98119bbb19b04ec94e.exe File created C:\Windows\bugMAKER.bat 657e059524346d98119bbb19b04ec94e.exe File created C:\Windows\SHARE_TEMP\Icon13.ico 657e059524346d98119bbb19b04ec94e.exe File created C:\Windows\winhash_up.exe 657e059524346d98119bbb19b04ec94e.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 657e059524346d98119bbb19b04ec94e.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 657e059524346d98119bbb19b04ec94e.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 657e059524346d98119bbb19b04ec94e.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 657e059524346d98119bbb19b04ec94e.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 657e059524346d98119bbb19b04ec94e.exe File created C:\Windows\winhash_up.exez 657e059524346d98119bbb19b04ec94e.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 657e059524346d98119bbb19b04ec94e.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 657e059524346d98119bbb19b04ec94e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2816 1972 657e059524346d98119bbb19b04ec94e.exe 28 PID 1972 wrote to memory of 2816 1972 657e059524346d98119bbb19b04ec94e.exe 28 PID 1972 wrote to memory of 2816 1972 657e059524346d98119bbb19b04ec94e.exe 28 PID 1972 wrote to memory of 2816 1972 657e059524346d98119bbb19b04ec94e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\657e059524346d98119bbb19b04ec94e.exe"C:\Users\Admin\AppData\Local\Temp\657e059524346d98119bbb19b04ec94e.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD54755a1f0aa384026390207effd816590
SHA19c3831eab16486f2e48c19fe456693e8387e4caa
SHA256348e4dfcdbaed60525e9fc357ae55ab553e277909cf4128e555c4b10410777e0
SHA5120e90cb5afb1b957440d7ac8aecf057697b9e4c2e19b154162f1c16150a4549dbfe6565ef3ea3670888ce587c2ca68c45725ade0eb50f785bd0839396acfd5f40