Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 05:45
Static task
static1
Behavioral task
behavioral1
Sample
8e5d1564c74b663a088a14a43534cfbc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8e5d1564c74b663a088a14a43534cfbc.exe
Resource
win10v2004-20231215-en
General
-
Target
8e5d1564c74b663a088a14a43534cfbc.exe
-
Size
192KB
-
MD5
8e5d1564c74b663a088a14a43534cfbc
-
SHA1
9aa5753c9ee2846bfa2818704eff6fd8b258fad8
-
SHA256
e8f0117d7e6bac61214111d08bb871dac0c3837f0b1a2b77e7279e27259ba809
-
SHA512
021babdfe9024b9e039193de94365318486bf5efb0eed403db97626afdbe5c666f154d53ad01d99febb355d407d8308d5ccf49695d2ef1931215566eda781920
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B8xkgnYZ:o68i3odBiTl2+TCU/ek8A
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 8e5d1564c74b663a088a14a43534cfbc.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\winhash_up.exez 8e5d1564c74b663a088a14a43534cfbc.exe File opened for modification C:\Windows\winhash_up.exez 8e5d1564c74b663a088a14a43534cfbc.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 8e5d1564c74b663a088a14a43534cfbc.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 8e5d1564c74b663a088a14a43534cfbc.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 8e5d1564c74b663a088a14a43534cfbc.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 8e5d1564c74b663a088a14a43534cfbc.exe File created C:\Windows\winhash_up.exe 8e5d1564c74b663a088a14a43534cfbc.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 8e5d1564c74b663a088a14a43534cfbc.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 8e5d1564c74b663a088a14a43534cfbc.exe File created C:\Windows\SHARE_TEMP\Icon13.ico 8e5d1564c74b663a088a14a43534cfbc.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 8e5d1564c74b663a088a14a43534cfbc.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 8e5d1564c74b663a088a14a43534cfbc.exe File created C:\Windows\bugMAKER.bat 8e5d1564c74b663a088a14a43534cfbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1384 wrote to memory of 736 1384 8e5d1564c74b663a088a14a43534cfbc.exe 28 PID 1384 wrote to memory of 736 1384 8e5d1564c74b663a088a14a43534cfbc.exe 28 PID 1384 wrote to memory of 736 1384 8e5d1564c74b663a088a14a43534cfbc.exe 28 PID 1384 wrote to memory of 736 1384 8e5d1564c74b663a088a14a43534cfbc.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e5d1564c74b663a088a14a43534cfbc.exe"C:\Users\Admin\AppData\Local\Temp\8e5d1564c74b663a088a14a43534cfbc.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD57ca238788b322e348478a3ef6f653850
SHA11fbd1767b0f5ff3e89ba9dde4df897e3c062f48b
SHA256e2ffb507cf9605adc4f70fb561922d6a5b5c529f5cc8978650359860f91f4c69
SHA512bbdab1f09b9003359602c956e73e4d9908152194b1701ba618644eb8d78d58a7211eaf48fa1bc6b221b3d915bf04a712bb395e45995d45be4b19f6b843b6dbe7