Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/03/2024, 20:33
Static task
static1
Behavioral task
behavioral1
Sample
d4767e23aed6e0432fb1aa0cb3cb062e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d4767e23aed6e0432fb1aa0cb3cb062e.exe
Resource
win10v2004-20231215-en
General
-
Target
d4767e23aed6e0432fb1aa0cb3cb062e.exe
-
Size
199KB
-
MD5
d4767e23aed6e0432fb1aa0cb3cb062e
-
SHA1
59d3a57d399d2191c066989b389f1d0b72fa7570
-
SHA256
261987dd8bbd49f3437686248c5156dd113dd22d5226f9dc31588bbfb3629fd8
-
SHA512
f59b4bd85f47337ddac9b7ebfe90bfc7be9285ae098fab2de4da69a3a3bd401e331f4e7701caff74ba817c4405f981b7eac9c7d0fb53d93d8984b402a60835ac
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B8ekgn2:o68i3odBiTl2+TCU/jk82
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" d4767e23aed6e0432fb1aa0cb3cb062e.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\winhash_up.exez d4767e23aed6e0432fb1aa0cb3cb062e.exe File created C:\Windows\SHARE_TEMP\Icon7.ico d4767e23aed6e0432fb1aa0cb3cb062e.exe File created C:\Windows\SHARE_TEMP\Icon14.ico d4767e23aed6e0432fb1aa0cb3cb062e.exe File created C:\Windows\bugMAKER.bat d4767e23aed6e0432fb1aa0cb3cb062e.exe File opened for modification C:\Windows\winhash_up.exez d4767e23aed6e0432fb1aa0cb3cb062e.exe File created C:\Windows\winhash_up.exe d4767e23aed6e0432fb1aa0cb3cb062e.exe File created C:\Windows\SHARE_TEMP\Icon2.ico d4767e23aed6e0432fb1aa0cb3cb062e.exe File created C:\Windows\SHARE_TEMP\Icon6.ico d4767e23aed6e0432fb1aa0cb3cb062e.exe File created C:\Windows\SHARE_TEMP\Icon12.ico d4767e23aed6e0432fb1aa0cb3cb062e.exe File created C:\Windows\SHARE_TEMP\Icon3.ico d4767e23aed6e0432fb1aa0cb3cb062e.exe File created C:\Windows\SHARE_TEMP\Icon5.ico d4767e23aed6e0432fb1aa0cb3cb062e.exe File created C:\Windows\SHARE_TEMP\Icon10.ico d4767e23aed6e0432fb1aa0cb3cb062e.exe File created C:\Windows\SHARE_TEMP\Icon13.ico d4767e23aed6e0432fb1aa0cb3cb062e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 300 wrote to memory of 2668 300 d4767e23aed6e0432fb1aa0cb3cb062e.exe 28 PID 300 wrote to memory of 2668 300 d4767e23aed6e0432fb1aa0cb3cb062e.exe 28 PID 300 wrote to memory of 2668 300 d4767e23aed6e0432fb1aa0cb3cb062e.exe 28 PID 300 wrote to memory of 2668 300 d4767e23aed6e0432fb1aa0cb3cb062e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4767e23aed6e0432fb1aa0cb3cb062e.exe"C:\Users\Admin\AppData\Local\Temp\d4767e23aed6e0432fb1aa0cb3cb062e.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:300 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD55f5a78427c85a6efe0a3515fc187d150
SHA1e4536ea28aea7ab4cb337ed57134de5987cc272b
SHA256817683592602322f372976517f71e848ac1f6df60183fda4402fa2e801e9eb0f
SHA512a22b739e377eb9753b0f0ec4b88e2c537c138eae0f5cfffa7036fdb209e946b8ec4e3d5d03733ca58a699c0cd0f357ced41964bf3079adb2da5baed3266681e8