Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/01/2024, 19:32
Static task
static1
Behavioral task
behavioral1
Sample
75556eae945cfeae21a57660316b4608.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
75556eae945cfeae21a57660316b4608.exe
Resource
win10v2004-20231222-en
General
-
Target
75556eae945cfeae21a57660316b4608.exe
-
Size
180KB
-
MD5
75556eae945cfeae21a57660316b4608
-
SHA1
43d246b7f6d1ef85f0fad773e958b48ecb3b6834
-
SHA256
1338f2082011323c7a4961ef066986f99007a6a8f87a9f8a12a2ee645854eec1
-
SHA512
b28a11c57f5a9ecf41dd7ee8776549c88cd121b2939022a4a74cfe40a124fdf314a2efe2c8ffb73ece42f729b711dbb0aa32ed133720c284957e648d7f7b7e6c
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B8rkgnu:o68i3odBiTl2+TCU/8k8u
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 75556eae945cfeae21a57660316b4608.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\winhash_up.exez 75556eae945cfeae21a57660316b4608.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 75556eae945cfeae21a57660316b4608.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 75556eae945cfeae21a57660316b4608.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 75556eae945cfeae21a57660316b4608.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 75556eae945cfeae21a57660316b4608.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 75556eae945cfeae21a57660316b4608.exe File opened for modification C:\Windows\winhash_up.exez 75556eae945cfeae21a57660316b4608.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 75556eae945cfeae21a57660316b4608.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 75556eae945cfeae21a57660316b4608.exe File created C:\Windows\bugMAKER.bat 75556eae945cfeae21a57660316b4608.exe File created C:\Windows\winhash_up.exe 75556eae945cfeae21a57660316b4608.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 75556eae945cfeae21a57660316b4608.exe File created C:\Windows\SHARE_TEMP\Icon13.ico 75556eae945cfeae21a57660316b4608.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2140 2256 75556eae945cfeae21a57660316b4608.exe 28 PID 2256 wrote to memory of 2140 2256 75556eae945cfeae21a57660316b4608.exe 28 PID 2256 wrote to memory of 2140 2256 75556eae945cfeae21a57660316b4608.exe 28 PID 2256 wrote to memory of 2140 2256 75556eae945cfeae21a57660316b4608.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\75556eae945cfeae21a57660316b4608.exe"C:\Users\Admin\AppData\Local\Temp\75556eae945cfeae21a57660316b4608.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:2140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD5f183e7c2ea8a129815cd089b00299c88
SHA1a96423cf92b663f7ab237a2deb3004a5f15c690c
SHA256541249d27eeae6fce64f621d6e1037e57d2694583d71aad9c13a96b665dc0e5e
SHA512fdaa00e58fa49d3932848150f35361978c92baf05ca10334756b36941606ef4aae717370127111fcf4ed4d6c3cc97da535c18de0ea7ab5d7882f74504a90f0a5