Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 12:33
Static task
static1
Behavioral task
behavioral1
Sample
e1ad183236d5ce8bcab38800d065d933.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e1ad183236d5ce8bcab38800d065d933.exe
Resource
win10v2004-20240226-en
General
-
Target
e1ad183236d5ce8bcab38800d065d933.exe
-
Size
222KB
-
MD5
e1ad183236d5ce8bcab38800d065d933
-
SHA1
a8a7f82c8e97e9eb62e7f0f01d886ad25cc59d3e
-
SHA256
29fd3ea92d1134d58d34e099ef4657acde452a8f2255439d530366a15b071947
-
SHA512
a58fc05e3b0f72bd741ef131793de2e1890c24eaedfd6926e3613c7570441b439c8f83882a3e4b3c6365ae8b45551e8daf7b28c4cf31c4339469aa1c53016368
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B8KEpjBFy11AA:o68i3odBiTl2+TCU/0huQk8CtkqH
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" e1ad183236d5ce8bcab38800d065d933.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\winhash_up.exez e1ad183236d5ce8bcab38800d065d933.exe File created C:\Windows\SHARE_TEMP\Icon3.ico e1ad183236d5ce8bcab38800d065d933.exe File created C:\Windows\SHARE_TEMP\Icon6.ico e1ad183236d5ce8bcab38800d065d933.exe File created C:\Windows\SHARE_TEMP\Icon7.ico e1ad183236d5ce8bcab38800d065d933.exe File created C:\Windows\winhash_up.exe e1ad183236d5ce8bcab38800d065d933.exe File created C:\Windows\SHARE_TEMP\Icon2.ico e1ad183236d5ce8bcab38800d065d933.exe File created C:\Windows\SHARE_TEMP\Icon12.ico e1ad183236d5ce8bcab38800d065d933.exe File created C:\Windows\SHARE_TEMP\Icon13.ico e1ad183236d5ce8bcab38800d065d933.exe File created C:\Windows\SHARE_TEMP\Icon14.ico e1ad183236d5ce8bcab38800d065d933.exe File created C:\Windows\bugMAKER.bat e1ad183236d5ce8bcab38800d065d933.exe File opened for modification C:\Windows\winhash_up.exez e1ad183236d5ce8bcab38800d065d933.exe File created C:\Windows\SHARE_TEMP\Icon5.ico e1ad183236d5ce8bcab38800d065d933.exe File created C:\Windows\SHARE_TEMP\Icon10.ico e1ad183236d5ce8bcab38800d065d933.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2776 1640 e1ad183236d5ce8bcab38800d065d933.exe 28 PID 1640 wrote to memory of 2776 1640 e1ad183236d5ce8bcab38800d065d933.exe 28 PID 1640 wrote to memory of 2776 1640 e1ad183236d5ce8bcab38800d065d933.exe 28 PID 1640 wrote to memory of 2776 1640 e1ad183236d5ce8bcab38800d065d933.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1ad183236d5ce8bcab38800d065d933.exe"C:\Users\Admin\AppData\Local\Temp\e1ad183236d5ce8bcab38800d065d933.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD59a20193f303104d8ddc69d3cb11f2816
SHA12436f5e3c93dcfd12c01c58c5cf2d99619eaedaf
SHA256bdc51e5d05096f621a8fe0d1b318a049f51d4f34e8afa6d491ebbd56d0c1777f
SHA5122f9c4a719c934b6ecddabec5109c5bf5f368815e1f5ea3bc8180ddada347937c1e7c06f24fdcf817364115625d031bce5bd8a2c5ab0536e99bb96f571daab5b7