Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 16:02
Static task
static1
Behavioral task
behavioral1
Sample
e5f7c9d2f7572524c93a16fa2c0b0914.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
e5f7c9d2f7572524c93a16fa2c0b0914.exe
Resource
win10v2004-20231215-en
General
-
Target
e5f7c9d2f7572524c93a16fa2c0b0914.exe
-
Size
235KB
-
MD5
e5f7c9d2f7572524c93a16fa2c0b0914
-
SHA1
828ac0b71b26de2188ed92b61d9745e984436782
-
SHA256
a306058f815aa49877385cc119e312cebd42938d8d8150aed84833377d2730bc
-
SHA512
dfa2f5f4b23b3726e12620023cc10db528e9b8e8e8ee530f8c76ada3ade929ef6f3df4499090d1d625e94323de9dc4fb95d1fcc2ea0dae77165572867441549c
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B8lkgnYHfQlAD:o68i3odBiTl2+TCU/6k8KfQlE/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" e5f7c9d2f7572524c93a16fa2c0b0914.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon2.ico e5f7c9d2f7572524c93a16fa2c0b0914.exe File created C:\Windows\SHARE_TEMP\Icon3.ico e5f7c9d2f7572524c93a16fa2c0b0914.exe File created C:\Windows\SHARE_TEMP\Icon5.ico e5f7c9d2f7572524c93a16fa2c0b0914.exe File created C:\Windows\SHARE_TEMP\Icon7.ico e5f7c9d2f7572524c93a16fa2c0b0914.exe File created C:\Windows\SHARE_TEMP\Icon14.ico e5f7c9d2f7572524c93a16fa2c0b0914.exe File created C:\Windows\bugMAKER.bat e5f7c9d2f7572524c93a16fa2c0b0914.exe File created C:\Windows\winhash_up.exez e5f7c9d2f7572524c93a16fa2c0b0914.exe File opened for modification C:\Windows\winhash_up.exez e5f7c9d2f7572524c93a16fa2c0b0914.exe File created C:\Windows\winhash_up.exe e5f7c9d2f7572524c93a16fa2c0b0914.exe File created C:\Windows\SHARE_TEMP\Icon6.ico e5f7c9d2f7572524c93a16fa2c0b0914.exe File created C:\Windows\SHARE_TEMP\Icon10.ico e5f7c9d2f7572524c93a16fa2c0b0914.exe File created C:\Windows\SHARE_TEMP\Icon12.ico e5f7c9d2f7572524c93a16fa2c0b0914.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1708 cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3968 wrote to memory of 1708 3968 e5f7c9d2f7572524c93a16fa2c0b0914.exe 25 PID 3968 wrote to memory of 1708 3968 e5f7c9d2f7572524c93a16fa2c0b0914.exe 25 PID 3968 wrote to memory of 1708 3968 e5f7c9d2f7572524c93a16fa2c0b0914.exe 25
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5f7c9d2f7572524c93a16fa2c0b0914.exe"C:\Users\Admin\AppData\Local\Temp\e5f7c9d2f7572524c93a16fa2c0b0914.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:1708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD5958c0e0af4577a18e67adfa75425babb
SHA1eedf5ca8fb817d7e183f35a03d4979d52fbab276
SHA2567641a2f202c27361cd4da847bef7c7bbc6d92b8f8360b9761a608d48cacf3611
SHA5127d6b51aac6968f45ab14ab89760490152689a8959807b03df78c91a837df3154654a7cf9d5e14421f1261ae2c1731f5f3bd903378b6f0332167dce27e49bcddc