Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2023, 15:51
Static task
static1
Behavioral task
behavioral1
Sample
54a7708b81e0d296649f686e5e4e30b9.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
54a7708b81e0d296649f686e5e4e30b9.exe
Resource
win10v2004-20231215-en
General
-
Target
54a7708b81e0d296649f686e5e4e30b9.exe
-
Size
475KB
-
MD5
54a7708b81e0d296649f686e5e4e30b9
-
SHA1
7c088aeb0118854d754c223875d7f4a99a4b2aa2
-
SHA256
a78cfbc114281a4ad947ed6576cdad7f8e710f912f725de43619d0edcca7d237
-
SHA512
f1b136add393265a8e755c898d34b798a1125009f36fea64bea020dcb89584bca2286325fac76d223220ef055d071ddf6010f5c799e7148e309a3eb2babe6370
-
SSDEEP
12288:TNodBiTI+TprA6EZO7KUQRZ66z24VZbdrpgrXN2LWzmidN:ZoPD+Tpr3vKU6Z66z24VZbFpgJ2LWzm+
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 54a7708b81e0d296649f686e5e4e30b9.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File opened for modification C:\Windows\winhash_up.exez 54a7708b81e0d296649f686e5e4e30b9.exe File created C:\Windows\winhash_up.exe 54a7708b81e0d296649f686e5e4e30b9.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 54a7708b81e0d296649f686e5e4e30b9.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 54a7708b81e0d296649f686e5e4e30b9.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 54a7708b81e0d296649f686e5e4e30b9.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 54a7708b81e0d296649f686e5e4e30b9.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 54a7708b81e0d296649f686e5e4e30b9.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 54a7708b81e0d296649f686e5e4e30b9.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 54a7708b81e0d296649f686e5e4e30b9.exe File created C:\Windows\bugMAKER.bat 54a7708b81e0d296649f686e5e4e30b9.exe File created C:\Windows\winhash_up.exez 54a7708b81e0d296649f686e5e4e30b9.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 54a7708b81e0d296649f686e5e4e30b9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3824 cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1004 wrote to memory of 3824 1004 54a7708b81e0d296649f686e5e4e30b9.exe 90 PID 1004 wrote to memory of 3824 1004 54a7708b81e0d296649f686e5e4e30b9.exe 90 PID 1004 wrote to memory of 3824 1004 54a7708b81e0d296649f686e5e4e30b9.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\54a7708b81e0d296649f686e5e4e30b9.exe"C:\Users\Admin\AppData\Local\Temp\54a7708b81e0d296649f686e5e4e30b9.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:3824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD56c738e84698784a49071a4c6a60c67a3
SHA1882eb46a332148a2d6a07cc73659fe86293e96cd
SHA2562dd19f40a22be2b7c1678196dcac464ffb91d99b85a0f9df7dfe444acc5006b7
SHA51256af2d0cb0043374882931378e29efa727eb18ca1baf47c927e664ae8d6f445f36457dfc3e97c6732f25fd80e3756633d6159537d8c708adf4f16cd9e4dc48fe