Analysis
-
max time kernel
137s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2023, 22:05
Static task
static1
Behavioral task
behavioral1
Sample
b1182ef1eb59c1269b6fc17e59a3ebce.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b1182ef1eb59c1269b6fc17e59a3ebce.exe
Resource
win10v2004-20231215-en
General
-
Target
b1182ef1eb59c1269b6fc17e59a3ebce.exe
-
Size
202KB
-
MD5
b1182ef1eb59c1269b6fc17e59a3ebce
-
SHA1
ede8eef9db2f87fca985911cf0a158c4a25cd017
-
SHA256
014a4b718bd99d04db7f432c2908fc50d2d2bbf5fa43e35ed50a6592b6b70408
-
SHA512
1fc990ecf7652284c516acad92113a4ff85c451b2eabf294649b1948aeefcbdab0746a6f16e5e5a99238d93dfc41908dcf7ddb8d901e3810fb9dc4ac47b4ad42
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8gpjBFy11Awq:o68i3odBiTl2+TCU/whuhul
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" b1182ef1eb59c1269b6fc17e59a3ebce.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon14.ico b1182ef1eb59c1269b6fc17e59a3ebce.exe File opened for modification C:\Windows\winhash_up.exez b1182ef1eb59c1269b6fc17e59a3ebce.exe File created C:\Windows\winhash_up.exe b1182ef1eb59c1269b6fc17e59a3ebce.exe File created C:\Windows\SHARE_TEMP\Icon3.ico b1182ef1eb59c1269b6fc17e59a3ebce.exe File created C:\Windows\SHARE_TEMP\Icon5.ico b1182ef1eb59c1269b6fc17e59a3ebce.exe File created C:\Windows\SHARE_TEMP\Icon6.ico b1182ef1eb59c1269b6fc17e59a3ebce.exe File created C:\Windows\SHARE_TEMP\Icon7.ico b1182ef1eb59c1269b6fc17e59a3ebce.exe File created C:\Windows\SHARE_TEMP\Icon12.ico b1182ef1eb59c1269b6fc17e59a3ebce.exe File created C:\Windows\bugMAKER.bat b1182ef1eb59c1269b6fc17e59a3ebce.exe File created C:\Windows\winhash_up.exez b1182ef1eb59c1269b6fc17e59a3ebce.exe File created C:\Windows\SHARE_TEMP\Icon2.ico b1182ef1eb59c1269b6fc17e59a3ebce.exe File created C:\Windows\SHARE_TEMP\Icon10.ico b1182ef1eb59c1269b6fc17e59a3ebce.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 220 cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4712 wrote to memory of 220 4712 b1182ef1eb59c1269b6fc17e59a3ebce.exe 89 PID 4712 wrote to memory of 220 4712 b1182ef1eb59c1269b6fc17e59a3ebce.exe 89 PID 4712 wrote to memory of 220 4712 b1182ef1eb59c1269b6fc17e59a3ebce.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1182ef1eb59c1269b6fc17e59a3ebce.exe"C:\Users\Admin\AppData\Local\Temp\b1182ef1eb59c1269b6fc17e59a3ebce.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD5df95c0234793e5a1fb8086b9d00fcc84
SHA1946a5e113266601ffbba415625c70ee6e6324b8d
SHA256bba852b9a2b90ef41dc13f444847274de51022455fe8cdabe0c88fb9f46baf74
SHA5124758059dad44b9677e65c68497fa2d1ca7622599406f7c82795f1910bf3b8523ae197da74fc02a897fee10cfea86abf402b0174ac3e6deca2aa457eccb6b3852