Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 10:47
Static task
static1
Behavioral task
behavioral1
Sample
8614d2b3b704e88c337430ebad2bdcf1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8614d2b3b704e88c337430ebad2bdcf1.exe
Resource
win10v2004-20231215-en
General
-
Target
8614d2b3b704e88c337430ebad2bdcf1.exe
-
Size
164KB
-
MD5
8614d2b3b704e88c337430ebad2bdcf1
-
SHA1
22c262d80d67e36b19b87ae92e9d5181628d2692
-
SHA256
4d541a186328dd6fe97762475bdb59b6bb8b3f90aea4efa2ff6bffe6a58b0766
-
SHA512
a5f883dcb820ddd7654403870c1bafe4136c9f9d361c3c8ddc99752da3efb0d2992014e1ed399c696e62c02fe2ed8c8d510cf3e86dc024b5020db8955edb914a
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8x:o68i3odBiTl2+TCU/v
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 8614d2b3b704e88c337430ebad2bdcf1.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\bugMAKER.bat 8614d2b3b704e88c337430ebad2bdcf1.exe File created C:\Windows\winhash_up.exez 8614d2b3b704e88c337430ebad2bdcf1.exe File opened for modification C:\Windows\winhash_up.exez 8614d2b3b704e88c337430ebad2bdcf1.exe File created C:\Windows\winhash_up.exe 8614d2b3b704e88c337430ebad2bdcf1.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 8614d2b3b704e88c337430ebad2bdcf1.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 8614d2b3b704e88c337430ebad2bdcf1.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 8614d2b3b704e88c337430ebad2bdcf1.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 8614d2b3b704e88c337430ebad2bdcf1.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 8614d2b3b704e88c337430ebad2bdcf1.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 8614d2b3b704e88c337430ebad2bdcf1.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 8614d2b3b704e88c337430ebad2bdcf1.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 8614d2b3b704e88c337430ebad2bdcf1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4928 cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1872 wrote to memory of 4928 1872 8614d2b3b704e88c337430ebad2bdcf1.exe 89 PID 1872 wrote to memory of 4928 1872 8614d2b3b704e88c337430ebad2bdcf1.exe 89 PID 1872 wrote to memory of 4928 1872 8614d2b3b704e88c337430ebad2bdcf1.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\8614d2b3b704e88c337430ebad2bdcf1.exe"C:\Users\Admin\AppData\Local\Temp\8614d2b3b704e88c337430ebad2bdcf1.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:4928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD56d56db8efc8576a0f4e96bd04f313273
SHA158ed210cd8b2527630272cc23e5819b04c0c32bd
SHA256f462b531af2b20ca9fc56bf018c064ce0effdfebca7010c12395842178553c07
SHA512560f0c9d2b88359f4c7f5b99cef31bbf7948ba3976ed06c50700bb1fd01b363ac47e186a0ccfff219bad6d0acc6a7c3d0ca712928e52a14a0451d2677c56c8b2