Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/03/2024, 02:18
Static task
static1
Behavioral task
behavioral1
Sample
bd6908dc636e7d048eabaaf21ef57dba.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bd6908dc636e7d048eabaaf21ef57dba.exe
Resource
win10v2004-20240226-en
General
-
Target
bd6908dc636e7d048eabaaf21ef57dba.exe
-
Size
187KB
-
MD5
bd6908dc636e7d048eabaaf21ef57dba
-
SHA1
ef8ee85944ff54a63b8dd71df9c3c2accf3a75ac
-
SHA256
1cf2095c7aac00a8c12d1aefa5f078ee2c3b443cf212104c382b5d237da38cfd
-
SHA512
4f90b053c0173e490c05495cb26d5b786ac247ae125cc8241d4cb3cc3ffc6658b3ddbc0a5beb43da47925d93d126026baf503b2e2c46dbcbfa10e3b4a5ed6d50
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B8dh1C:o68i3odBiTl2+TCU/s1C
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" bd6908dc636e7d048eabaaf21ef57dba.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon6.ico bd6908dc636e7d048eabaaf21ef57dba.exe File created C:\Windows\SHARE_TEMP\Icon10.ico bd6908dc636e7d048eabaaf21ef57dba.exe File opened for modification C:\Windows\winhash_up.exez bd6908dc636e7d048eabaaf21ef57dba.exe File created C:\Windows\SHARE_TEMP\Icon5.ico bd6908dc636e7d048eabaaf21ef57dba.exe File created C:\Windows\SHARE_TEMP\Icon14.ico bd6908dc636e7d048eabaaf21ef57dba.exe File created C:\Windows\SHARE_TEMP\Icon2.ico bd6908dc636e7d048eabaaf21ef57dba.exe File created C:\Windows\SHARE_TEMP\Icon3.ico bd6908dc636e7d048eabaaf21ef57dba.exe File created C:\Windows\bugMAKER.bat bd6908dc636e7d048eabaaf21ef57dba.exe File created C:\Windows\SHARE_TEMP\Icon7.ico bd6908dc636e7d048eabaaf21ef57dba.exe File created C:\Windows\SHARE_TEMP\Icon13.ico bd6908dc636e7d048eabaaf21ef57dba.exe File created C:\Windows\SHARE_TEMP\Icon12.ico bd6908dc636e7d048eabaaf21ef57dba.exe File created C:\Windows\winhash_up.exez bd6908dc636e7d048eabaaf21ef57dba.exe File created C:\Windows\winhash_up.exe bd6908dc636e7d048eabaaf21ef57dba.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2724 2056 bd6908dc636e7d048eabaaf21ef57dba.exe 28 PID 2056 wrote to memory of 2724 2056 bd6908dc636e7d048eabaaf21ef57dba.exe 28 PID 2056 wrote to memory of 2724 2056 bd6908dc636e7d048eabaaf21ef57dba.exe 28 PID 2056 wrote to memory of 2724 2056 bd6908dc636e7d048eabaaf21ef57dba.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd6908dc636e7d048eabaaf21ef57dba.exe"C:\Users\Admin\AppData\Local\Temp\bd6908dc636e7d048eabaaf21ef57dba.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD5c1520cc5011862638f8c7dabfb51e0b6
SHA102a7b6fcbdc69b2ececa5d7bb0ba42a399da6a29
SHA2567aa1b37bcc3a50534b01708dc29a20fd52e3a040f22aa00b0f2dead2b83056e6
SHA512e30fa4b194e1f19378a0258958757802cb2d48bfbb707220bd57d456c8d2682098bd7d4654c71f2eb2968d8c11a2ac002e4f62f16ccf2ca8476765ebe420b50a