Analysis
-
max time kernel
136s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2023 13:27
Static task
static1
Behavioral task
behavioral1
Sample
32d76f4b52af21b2bd990d5ce322bba0.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
32d76f4b52af21b2bd990d5ce322bba0.exe
Resource
win10v2004-20231215-en
General
-
Target
32d76f4b52af21b2bd990d5ce322bba0.exe
-
Size
168KB
-
MD5
32d76f4b52af21b2bd990d5ce322bba0
-
SHA1
0ffdeb45c94af2709ddd48c0e40723c2883c4407
-
SHA256
3faddbbae6cd5f7709d765b07c158b18d067124c099c325ab567adde14f8c33e
-
SHA512
33b844ec100375bd3c1fface1266d2955a86096db17c42505fe0a609cd5eb0644a299d3f0f120e184732589c98c65ab5bd1943dbc351925305869d23237f1cb2
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/k8h:o68i3odBiTl2+TCU/B
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 32d76f4b52af21b2bd990d5ce322bba0.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon2.ico 32d76f4b52af21b2bd990d5ce322bba0.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 32d76f4b52af21b2bd990d5ce322bba0.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 32d76f4b52af21b2bd990d5ce322bba0.exe File created C:\Windows\bugMAKER.bat 32d76f4b52af21b2bd990d5ce322bba0.exe File created C:\Windows\winhash_up.exez 32d76f4b52af21b2bd990d5ce322bba0.exe File opened for modification C:\Windows\winhash_up.exez 32d76f4b52af21b2bd990d5ce322bba0.exe File created C:\Windows\winhash_up.exe 32d76f4b52af21b2bd990d5ce322bba0.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 32d76f4b52af21b2bd990d5ce322bba0.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 32d76f4b52af21b2bd990d5ce322bba0.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 32d76f4b52af21b2bd990d5ce322bba0.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 32d76f4b52af21b2bd990d5ce322bba0.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 32d76f4b52af21b2bd990d5ce322bba0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4612 cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3812 wrote to memory of 4612 3812 32d76f4b52af21b2bd990d5ce322bba0.exe 89 PID 3812 wrote to memory of 4612 3812 32d76f4b52af21b2bd990d5ce322bba0.exe 89 PID 3812 wrote to memory of 4612 3812 32d76f4b52af21b2bd990d5ce322bba0.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\32d76f4b52af21b2bd990d5ce322bba0.exe"C:\Users\Admin\AppData\Local\Temp\32d76f4b52af21b2bd990d5ce322bba0.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:4612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD51daecfa71bc0228dd9afdcce9ef4df1c
SHA1ca2d7c55e77a18a2a2fee7e5364cebfc96e02c06
SHA2567dc2af1205c685126f5d90d1a945787ffed7e498e94f9004a4c60941f089be75
SHA51242da0e5251984e8fad0ec7cf80eb3c334378356e1be46b2457392698d17bfee524e14c44f42b75008038b1739c12ea5b6a357f9ae0b9f60e54e9076a98d1b9b4