Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 03:50
Static task
static1
Behavioral task
behavioral1
Sample
c79da0758d4f24bd5cce47c48d9b271a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c79da0758d4f24bd5cce47c48d9b271a.exe
Resource
win10v2004-20240226-en
General
-
Target
c79da0758d4f24bd5cce47c48d9b271a.exe
-
Size
231KB
-
MD5
c79da0758d4f24bd5cce47c48d9b271a
-
SHA1
3f4a37595799c11d300708387e7e71d693ba7b88
-
SHA256
802dbfdfed3a825876b1e5597938ea9be0af836db8c303d29e5b1b172c095c84
-
SHA512
b109931aaf6bc8a05bf528a9edd2c2c352ee32697178ba6d01dd8c9b95c1028c7e312d6ebe865dcdbed535dfd356f2d30501b3af623cdadbed80066ed75f6a15
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B8PpjBFy11AwL:o68i3odBiTl2+TCU/IhuhptkqxF
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" c79da0758d4f24bd5cce47c48d9b271a.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon13.ico c79da0758d4f24bd5cce47c48d9b271a.exe File created C:\Windows\SHARE_TEMP\Icon12.ico c79da0758d4f24bd5cce47c48d9b271a.exe File created C:\Windows\SHARE_TEMP\Icon14.ico c79da0758d4f24bd5cce47c48d9b271a.exe File created C:\Windows\SHARE_TEMP\Icon7.ico c79da0758d4f24bd5cce47c48d9b271a.exe File created C:\Windows\bugMAKER.bat c79da0758d4f24bd5cce47c48d9b271a.exe File created C:\Windows\winhash_up.exez c79da0758d4f24bd5cce47c48d9b271a.exe File opened for modification C:\Windows\winhash_up.exez c79da0758d4f24bd5cce47c48d9b271a.exe File created C:\Windows\winhash_up.exe c79da0758d4f24bd5cce47c48d9b271a.exe File created C:\Windows\SHARE_TEMP\Icon5.ico c79da0758d4f24bd5cce47c48d9b271a.exe File created C:\Windows\SHARE_TEMP\Icon6.ico c79da0758d4f24bd5cce47c48d9b271a.exe File created C:\Windows\SHARE_TEMP\Icon2.ico c79da0758d4f24bd5cce47c48d9b271a.exe File created C:\Windows\SHARE_TEMP\Icon3.ico c79da0758d4f24bd5cce47c48d9b271a.exe File created C:\Windows\SHARE_TEMP\Icon10.ico c79da0758d4f24bd5cce47c48d9b271a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1048 wrote to memory of 2688 1048 c79da0758d4f24bd5cce47c48d9b271a.exe 28 PID 1048 wrote to memory of 2688 1048 c79da0758d4f24bd5cce47c48d9b271a.exe 28 PID 1048 wrote to memory of 2688 1048 c79da0758d4f24bd5cce47c48d9b271a.exe 28 PID 1048 wrote to memory of 2688 1048 c79da0758d4f24bd5cce47c48d9b271a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c79da0758d4f24bd5cce47c48d9b271a.exe"C:\Users\Admin\AppData\Local\Temp\c79da0758d4f24bd5cce47c48d9b271a.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD5c509b6062d5c8cdd2ef170a1ab3f090b
SHA15fbc9bbadfefbf0dc5254bd493b5e95527697838
SHA256f02fe7494690904d4f252e87d70eedf6562d37b48496833a9e2d00ba69e1fd71
SHA5121960bd5b73c18f04568ea9dca222ac15cc5346c1201cfd65baafc1ed058391ca58b5fe56c1408d9ca87cc92634fff251efd94e84e3b744a14ff4761de81f8dfa