Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/01/2024, 04:27
Static task
static1
Behavioral task
behavioral1
Sample
766183bd078b0a05cdcfed1f0ad4a8d0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
766183bd078b0a05cdcfed1f0ad4a8d0.exe
Resource
win10v2004-20231215-en
General
-
Target
766183bd078b0a05cdcfed1f0ad4a8d0.exe
-
Size
187KB
-
MD5
766183bd078b0a05cdcfed1f0ad4a8d0
-
SHA1
e58dbfcbac0f896948f64b63a3c00c07565a951e
-
SHA256
45c54bd1f77849b135d0dfe3f23ed3b874e6d06a69ab4cb1ceba1c5816a2ea5e
-
SHA512
1f58fcef602caf30e289d1a0b8405e0052734649c842bd9957d55a09b139479b4b027232451b5adc48a782bdbc1c3af4ec5bc720d72a0e0c2a7b0131222e253e
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B8/pjBFy11Awp:o68i3odBiTl2+TCU/yhuhuW
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 766183bd078b0a05cdcfed1f0ad4a8d0.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\winhash_up.exe 766183bd078b0a05cdcfed1f0ad4a8d0.exe File created C:\Windows\SHARE_TEMP\Icon13.ico 766183bd078b0a05cdcfed1f0ad4a8d0.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 766183bd078b0a05cdcfed1f0ad4a8d0.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 766183bd078b0a05cdcfed1f0ad4a8d0.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 766183bd078b0a05cdcfed1f0ad4a8d0.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 766183bd078b0a05cdcfed1f0ad4a8d0.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 766183bd078b0a05cdcfed1f0ad4a8d0.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 766183bd078b0a05cdcfed1f0ad4a8d0.exe File created C:\Windows\bugMAKER.bat 766183bd078b0a05cdcfed1f0ad4a8d0.exe File created C:\Windows\winhash_up.exez 766183bd078b0a05cdcfed1f0ad4a8d0.exe File opened for modification C:\Windows\winhash_up.exez 766183bd078b0a05cdcfed1f0ad4a8d0.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 766183bd078b0a05cdcfed1f0ad4a8d0.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 766183bd078b0a05cdcfed1f0ad4a8d0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2684 2636 766183bd078b0a05cdcfed1f0ad4a8d0.exe 28 PID 2636 wrote to memory of 2684 2636 766183bd078b0a05cdcfed1f0ad4a8d0.exe 28 PID 2636 wrote to memory of 2684 2636 766183bd078b0a05cdcfed1f0ad4a8d0.exe 28 PID 2636 wrote to memory of 2684 2636 766183bd078b0a05cdcfed1f0ad4a8d0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\766183bd078b0a05cdcfed1f0ad4a8d0.exe"C:\Users\Admin\AppData\Local\Temp\766183bd078b0a05cdcfed1f0ad4a8d0.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD5d9bd8e412192f532e038da89384fc16a
SHA12c12493159cb3abca00750d361b3eccf55297ad5
SHA256b12d4b978561a75a34abff48c544210cd78eae7965d1b1f5a06d7f2c8550c25b
SHA512bcde00898a2338533705bb26dbac20a325dcd478f1350085a77d5c4d67cf16999043d7c6ceb44b7549492aad57c2588456982d2657c396bfbf9f87985215fbe0