Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03-02-2024 02:37
Static task
static1
Behavioral task
behavioral1
Sample
8b2dae0ca4fcaa27a4ee6993c6d925bc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8b2dae0ca4fcaa27a4ee6993c6d925bc.exe
Resource
win10v2004-20231215-en
General
-
Target
8b2dae0ca4fcaa27a4ee6993c6d925bc.exe
-
Size
209KB
-
MD5
8b2dae0ca4fcaa27a4ee6993c6d925bc
-
SHA1
4150ff0af606c65846df49dbb4daa5a813e4947a
-
SHA256
9bf936c5581ea04d9979a6c223342f6067b18ceb810fd6f3060a0287ab3edcee
-
SHA512
943d24ccda52984a43a51fb1ca4643c3422ca0516f1a9a4ef3a48dc4c17a8ed8990e58aef381375da851004fd924c195d6035c70f102874f6bf1b707c259a8b9
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B8dpjBFy11Awi:o68i3odBiTl2+TCU/ihuhuIp4
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 8b2dae0ca4fcaa27a4ee6993c6d925bc.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon5.ico 8b2dae0ca4fcaa27a4ee6993c6d925bc.exe File opened for modification C:\Windows\winhash_up.exez 8b2dae0ca4fcaa27a4ee6993c6d925bc.exe File created C:\Windows\winhash_up.exe 8b2dae0ca4fcaa27a4ee6993c6d925bc.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 8b2dae0ca4fcaa27a4ee6993c6d925bc.exe File created C:\Windows\SHARE_TEMP\Icon13.ico 8b2dae0ca4fcaa27a4ee6993c6d925bc.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 8b2dae0ca4fcaa27a4ee6993c6d925bc.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 8b2dae0ca4fcaa27a4ee6993c6d925bc.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 8b2dae0ca4fcaa27a4ee6993c6d925bc.exe File created C:\Windows\bugMAKER.bat 8b2dae0ca4fcaa27a4ee6993c6d925bc.exe File created C:\Windows\winhash_up.exez 8b2dae0ca4fcaa27a4ee6993c6d925bc.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 8b2dae0ca4fcaa27a4ee6993c6d925bc.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 8b2dae0ca4fcaa27a4ee6993c6d925bc.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 8b2dae0ca4fcaa27a4ee6993c6d925bc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2092 wrote to memory of 1392 2092 8b2dae0ca4fcaa27a4ee6993c6d925bc.exe 2 PID 2092 wrote to memory of 1392 2092 8b2dae0ca4fcaa27a4ee6993c6d925bc.exe 2 PID 2092 wrote to memory of 1392 2092 8b2dae0ca4fcaa27a4ee6993c6d925bc.exe 2 PID 2092 wrote to memory of 1392 2092 8b2dae0ca4fcaa27a4ee6993c6d925bc.exe 2
Processes
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat1⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\8b2dae0ca4fcaa27a4ee6993c6d925bc.exe"C:\Users\Admin\AppData\Local\Temp\8b2dae0ca4fcaa27a4ee6993c6d925bc.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD51a24f0d49e8ca89bcba1ef514d752470
SHA1271e22b448b5806a1304ea43b528af7d69478200
SHA256bc15d0797df9d2339737ab441be03d96f108a740aaae90bb8de6b053f14365f1
SHA51250535598e67f4dd7198ff555624ac52901714cc12d506e3ae21c46f1a2e02345353a92b15fe849a3f6e54a36bd7267d6654701c5939d1090076bfc89df909b8b