Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/02/2024, 09:38
Static task
static1
Behavioral task
behavioral1
Sample
a3745355a77df83c39e8a1087fdf10dd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a3745355a77df83c39e8a1087fdf10dd.exe
Resource
win10v2004-20240221-en
General
-
Target
a3745355a77df83c39e8a1087fdf10dd.exe
-
Size
175KB
-
MD5
a3745355a77df83c39e8a1087fdf10dd
-
SHA1
6e614dd8ee6dd14ac34442aebd0dc160f74d1a97
-
SHA256
02945a7a779f7ed38f6733b35a9bacf5b6e138dffe457f547f7474530b67cb5c
-
SHA512
d0bad4abf1d4039662602b55317f97aecd1a302a5875aa721edc4968d2f1df3ea88ead34ef11ef41ee2c995988b8dc7f06eb0f5bce9d412f52e05676ee78a636
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B87pjBFy0:o68i3odBiTl2+TCU/Wl
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" a3745355a77df83c39e8a1087fdf10dd.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\winhash_up.exe a3745355a77df83c39e8a1087fdf10dd.exe File created C:\Windows\SHARE_TEMP\Icon12.ico a3745355a77df83c39e8a1087fdf10dd.exe File created C:\Windows\SHARE_TEMP\Icon14.ico a3745355a77df83c39e8a1087fdf10dd.exe File created C:\Windows\winhash_up.exez a3745355a77df83c39e8a1087fdf10dd.exe File opened for modification C:\Windows\winhash_up.exez a3745355a77df83c39e8a1087fdf10dd.exe File created C:\Windows\SHARE_TEMP\Icon3.ico a3745355a77df83c39e8a1087fdf10dd.exe File created C:\Windows\SHARE_TEMP\Icon6.ico a3745355a77df83c39e8a1087fdf10dd.exe File created C:\Windows\SHARE_TEMP\Icon7.ico a3745355a77df83c39e8a1087fdf10dd.exe File created C:\Windows\SHARE_TEMP\Icon13.ico a3745355a77df83c39e8a1087fdf10dd.exe File created C:\Windows\SHARE_TEMP\Icon2.ico a3745355a77df83c39e8a1087fdf10dd.exe File created C:\Windows\SHARE_TEMP\Icon10.ico a3745355a77df83c39e8a1087fdf10dd.exe File created C:\Windows\SHARE_TEMP\Icon5.ico a3745355a77df83c39e8a1087fdf10dd.exe File created C:\Windows\bugMAKER.bat a3745355a77df83c39e8a1087fdf10dd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2244 2180 a3745355a77df83c39e8a1087fdf10dd.exe 28 PID 2180 wrote to memory of 2244 2180 a3745355a77df83c39e8a1087fdf10dd.exe 28 PID 2180 wrote to memory of 2244 2180 a3745355a77df83c39e8a1087fdf10dd.exe 28 PID 2180 wrote to memory of 2244 2180 a3745355a77df83c39e8a1087fdf10dd.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3745355a77df83c39e8a1087fdf10dd.exe"C:\Users\Admin\AppData\Local\Temp\a3745355a77df83c39e8a1087fdf10dd.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:2244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD57439a45000fe05f1524fd39876c5ecc3
SHA1c7cf6af1f967ec572cab889092412b4deaf08177
SHA256f39b6a3e07b576d532aa5da18a689781a17d9e195ff71681ab99a72463c804ac
SHA512a450be68c57986a82721eb1fd82518a26e90f09de7df4c9dc1c29a434cc408be6d2a9a41af48aac101cb9e4258de235d28cbf3d5ac1018b405f54b4835bdbfb1