Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2023, 12:35
Static task
static1
Behavioral task
behavioral1
Sample
2499c3db53e862723d74f2a189c0097c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2499c3db53e862723d74f2a189c0097c.exe
Resource
win10v2004-20231215-en
General
-
Target
2499c3db53e862723d74f2a189c0097c.exe
-
Size
193KB
-
MD5
2499c3db53e862723d74f2a189c0097c
-
SHA1
7e9731a00818923c6d26c8fc981cb07392bbecb6
-
SHA256
4bfed04325d85ebd559dc23df3eccd0356764a56e84834d4ffb40e1fc8765c2b
-
SHA512
b4046f64a991436932c36dbf94704019e50c2fab678fc9a85d78a655bcc43b5239776a6a2c9102d13c83aafb128ee5927a056ac39820c66136f68a5ad640ca31
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B8w:o68i3odBiTl2+TCU/9
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 2499c3db53e862723d74f2a189c0097c.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon12.ico 2499c3db53e862723d74f2a189c0097c.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 2499c3db53e862723d74f2a189c0097c.exe File created C:\Windows\bugMAKER.bat 2499c3db53e862723d74f2a189c0097c.exe File created C:\Windows\winhash_up.exe 2499c3db53e862723d74f2a189c0097c.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 2499c3db53e862723d74f2a189c0097c.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 2499c3db53e862723d74f2a189c0097c.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 2499c3db53e862723d74f2a189c0097c.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 2499c3db53e862723d74f2a189c0097c.exe File created C:\Windows\winhash_up.exez 2499c3db53e862723d74f2a189c0097c.exe File opened for modification C:\Windows\winhash_up.exez 2499c3db53e862723d74f2a189c0097c.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 2499c3db53e862723d74f2a189c0097c.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 2499c3db53e862723d74f2a189c0097c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1532 cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4052 wrote to memory of 1532 4052 2499c3db53e862723d74f2a189c0097c.exe 90 PID 4052 wrote to memory of 1532 4052 2499c3db53e862723d74f2a189c0097c.exe 90 PID 4052 wrote to memory of 1532 4052 2499c3db53e862723d74f2a189c0097c.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2499c3db53e862723d74f2a189c0097c.exe"C:\Users\Admin\AppData\Local\Temp\2499c3db53e862723d74f2a189c0097c.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:1532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD588e6831bc74fa9084b236c451a9b48a9
SHA1a9617be26b55ad8a071fba689997603a2fd85882
SHA25695832e11127b572949db3c5bee29fa72f682c4808d360435bdb6a2a20a93ab80
SHA512bf4962a79c8a639e8eb0b847f4d69bb3b56cd9ab404421ea0561b7b3f64f8bc5c419fffb20b14f1f98d91d3ba6bbc8b0d0f325dc34331c3835db5c04db4de463