Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/03/2024, 14:30
Static task
static1
Behavioral task
behavioral1
Sample
bed77d2d0f491679dbab2b2d40661fb2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bed77d2d0f491679dbab2b2d40661fb2.exe
Resource
win10v2004-20240226-en
General
-
Target
bed77d2d0f491679dbab2b2d40661fb2.exe
-
Size
161KB
-
MD5
bed77d2d0f491679dbab2b2d40661fb2
-
SHA1
21abfdd00227c89342b60e7e77bdc6af9b0d7b28
-
SHA256
d1b65269d3dda2705c4d070065e20ef0dbddee818fca5c85b83aaf809313800b
-
SHA512
b803cc484b0d53663c5c0f61e0910b2eaffc418f7320e32e4ee6d70d1d35a971c327fa326bad6c6a89319878833c00c8e59270b4326b9318d1ca849f855261ca
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B8A:o68i3odBiTl2+TCU/7
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" bed77d2d0f491679dbab2b2d40661fb2.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon3.ico bed77d2d0f491679dbab2b2d40661fb2.exe File created C:\Windows\SHARE_TEMP\Icon14.ico bed77d2d0f491679dbab2b2d40661fb2.exe File opened for modification C:\Windows\winhash_up.exez bed77d2d0f491679dbab2b2d40661fb2.exe File created C:\Windows\SHARE_TEMP\Icon5.ico bed77d2d0f491679dbab2b2d40661fb2.exe File created C:\Windows\SHARE_TEMP\Icon6.ico bed77d2d0f491679dbab2b2d40661fb2.exe File created C:\Windows\SHARE_TEMP\Icon7.ico bed77d2d0f491679dbab2b2d40661fb2.exe File created C:\Windows\SHARE_TEMP\Icon13.ico bed77d2d0f491679dbab2b2d40661fb2.exe File created C:\Windows\winhash_up.exez bed77d2d0f491679dbab2b2d40661fb2.exe File created C:\Windows\SHARE_TEMP\Icon2.ico bed77d2d0f491679dbab2b2d40661fb2.exe File created C:\Windows\bugMAKER.bat bed77d2d0f491679dbab2b2d40661fb2.exe File created C:\Windows\winhash_up.exe bed77d2d0f491679dbab2b2d40661fb2.exe File created C:\Windows\SHARE_TEMP\Icon10.ico bed77d2d0f491679dbab2b2d40661fb2.exe File created C:\Windows\SHARE_TEMP\Icon12.ico bed77d2d0f491679dbab2b2d40661fb2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2904 2356 bed77d2d0f491679dbab2b2d40661fb2.exe 28 PID 2356 wrote to memory of 2904 2356 bed77d2d0f491679dbab2b2d40661fb2.exe 28 PID 2356 wrote to memory of 2904 2356 bed77d2d0f491679dbab2b2d40661fb2.exe 28 PID 2356 wrote to memory of 2904 2356 bed77d2d0f491679dbab2b2d40661fb2.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bed77d2d0f491679dbab2b2d40661fb2.exe"C:\Users\Admin\AppData\Local\Temp\bed77d2d0f491679dbab2b2d40661fb2.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD5be3b3fd297d250e9182f3b558ff024f2
SHA1c9f014e3f51aba97c1eaf619d83e13256af772d6
SHA256a3d50a62fa293c629cd80f9b5b025aa662a30a0a1e6c62aa2bf2f22ebd4aec1e
SHA512755b6019a33e384dafd3faa009646aa856c57e3e7f55e8f7d617884b676866b10580db0ae9c54d13d8ae93d3864206c6aadabb32d186f3d73872989c67673c36