Analysis
-
max time kernel
159s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 03:30
Static task
static1
Behavioral task
behavioral1
Sample
5b39b99d88d737d2f841234eecb36de2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5b39b99d88d737d2f841234eecb36de2.exe
Resource
win10v2004-20231215-en
General
-
Target
5b39b99d88d737d2f841234eecb36de2.exe
-
Size
207KB
-
MD5
5b39b99d88d737d2f841234eecb36de2
-
SHA1
f40cbdaacc5f6e54d893fbd049c70bdd0d1115d8
-
SHA256
d4d43d221626db3343cbd2a78a6be9cf19659bd7c0269d660a9636419963b6ec
-
SHA512
79a4cca205db7f5b83e028951d0c7dbdf5688fa6cea7fcad4d2adc50fe96f70144e5b677df8aabefc2ed1ac237de350bf79fbe8f812851c8f760b7058f8efdfc
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8rGpjBFy11ot:o68i3odBiTl2+TCU/RsHk8F
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 5b39b99d88d737d2f841234eecb36de2.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon2.ico 5b39b99d88d737d2f841234eecb36de2.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 5b39b99d88d737d2f841234eecb36de2.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 5b39b99d88d737d2f841234eecb36de2.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 5b39b99d88d737d2f841234eecb36de2.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 5b39b99d88d737d2f841234eecb36de2.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 5b39b99d88d737d2f841234eecb36de2.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 5b39b99d88d737d2f841234eecb36de2.exe File created C:\Windows\winhash_up.exe 5b39b99d88d737d2f841234eecb36de2.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 5b39b99d88d737d2f841234eecb36de2.exe File opened for modification C:\Windows\winhash_up.exez 5b39b99d88d737d2f841234eecb36de2.exe File created C:\Windows\bugMAKER.bat 5b39b99d88d737d2f841234eecb36de2.exe File created C:\Windows\winhash_up.exez 5b39b99d88d737d2f841234eecb36de2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 380 cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4932 wrote to memory of 380 4932 5b39b99d88d737d2f841234eecb36de2.exe 39 PID 4932 wrote to memory of 380 4932 5b39b99d88d737d2f841234eecb36de2.exe 39 PID 4932 wrote to memory of 380 4932 5b39b99d88d737d2f841234eecb36de2.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b39b99d88d737d2f841234eecb36de2.exe"C:\Users\Admin\AppData\Local\Temp\5b39b99d88d737d2f841234eecb36de2.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD544d3985106ca5cf50f52a91bf24624dd
SHA19ac0f394d929e227b41504bd63189c4e3be8c336
SHA2565cf9b947e98d92107d8661acb39e1d99171542da98a065725e83ea352c0cddad
SHA5126fde96a1de9aa7fde5577fa844bfc0b6178d332600d949a0307a36d7e1c8805c40df96b628ac11a13c4f371d0a25e41955fa1c36a98c3ff13bc89a9884cede50