Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/02/2024, 00:43
Static task
static1
Behavioral task
behavioral1
Sample
aa9260cc25a5133866099166b6e912e6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aa9260cc25a5133866099166b6e912e6.exe
Resource
win10v2004-20240226-en
General
-
Target
aa9260cc25a5133866099166b6e912e6.exe
-
Size
235KB
-
MD5
aa9260cc25a5133866099166b6e912e6
-
SHA1
1b1d15159f514a40d8b63e4151c573d2690423ab
-
SHA256
d3802c04f43765dd959f0e0cf38022b95eb045360d76ae1049402309980afe89
-
SHA512
1694bfa79c28fe883e8a9f0f289487434b3666e94df8ef5e350f9f6a5db0961420719b3c5c74545cfdd18ff5f4c903fe1a0e29e05376e2c2ffbe97a07324957e
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8rGpjBFy11A0:o68i3odBiTl2+TCU/RshuhukhuhugkZ
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" aa9260cc25a5133866099166b6e912e6.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon10.ico aa9260cc25a5133866099166b6e912e6.exe File created C:\Windows\SHARE_TEMP\Icon14.ico aa9260cc25a5133866099166b6e912e6.exe File opened for modification C:\Windows\winhash_up.exez aa9260cc25a5133866099166b6e912e6.exe File created C:\Windows\SHARE_TEMP\Icon13.ico aa9260cc25a5133866099166b6e912e6.exe File created C:\Windows\bugMAKER.bat aa9260cc25a5133866099166b6e912e6.exe File created C:\Windows\SHARE_TEMP\Icon5.ico aa9260cc25a5133866099166b6e912e6.exe File created C:\Windows\SHARE_TEMP\Icon2.ico aa9260cc25a5133866099166b6e912e6.exe File created C:\Windows\SHARE_TEMP\Icon6.ico aa9260cc25a5133866099166b6e912e6.exe File created C:\Windows\SHARE_TEMP\Icon12.ico aa9260cc25a5133866099166b6e912e6.exe File created C:\Windows\winhash_up.exez aa9260cc25a5133866099166b6e912e6.exe File created C:\Windows\SHARE_TEMP\Icon3.ico aa9260cc25a5133866099166b6e912e6.exe File created C:\Windows\SHARE_TEMP\Icon7.ico aa9260cc25a5133866099166b6e912e6.exe File created C:\Windows\winhash_up.exe aa9260cc25a5133866099166b6e912e6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2608 2132 aa9260cc25a5133866099166b6e912e6.exe 28 PID 2132 wrote to memory of 2608 2132 aa9260cc25a5133866099166b6e912e6.exe 28 PID 2132 wrote to memory of 2608 2132 aa9260cc25a5133866099166b6e912e6.exe 28 PID 2132 wrote to memory of 2608 2132 aa9260cc25a5133866099166b6e912e6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa9260cc25a5133866099166b6e912e6.exe"C:\Users\Admin\AppData\Local\Temp\aa9260cc25a5133866099166b6e912e6.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:2608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD5abab6e22ef4d43e3d71f624647d5d0e2
SHA1893dd058752a35e981c0c746bd1eaff6c1369792
SHA25657f783814429be5974d23af198eca4d10835328883e2b01da4b627f3a5699bc1
SHA5123ff093e6bd683eaa23dddf037fdd9246eaf0e09244f4ba2bd105a83f92a7f843018d13cc040195ee5e9af850637e92ae8b1f37ebfe9f5aaba38eb49aecd0433c