Analysis
-
max time kernel
117s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 23:01
Static task
static1
Behavioral task
behavioral1
Sample
1f4a44a94c5ae3eb5d51fa92e4c1a76d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1f4a44a94c5ae3eb5d51fa92e4c1a76d.exe
Resource
win10v2004-20231222-en
General
-
Target
1f4a44a94c5ae3eb5d51fa92e4c1a76d.exe
-
Size
192KB
-
MD5
1f4a44a94c5ae3eb5d51fa92e4c1a76d
-
SHA1
1a9b116c5de87f6c8fb5e14e73624ce49b6c1d0d
-
SHA256
680c2a9e7a9fce9690f30a3663a8b91ed2e3ab0df4305122a61c374387ee8bfe
-
SHA512
684fc88f041b9962e59f0da0a882be195cfd411f86a25a5748c2f2c5b5b4506e6610b876fb0524e9cba8033090dbba468ed49920dd993a2bde250dec24ef0aaf
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B87pjBFy11AwA:o68i3odBiTl2+TCU/Whuhut
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 1f4a44a94c5ae3eb5d51fa92e4c1a76d.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon12.ico 1f4a44a94c5ae3eb5d51fa92e4c1a76d.exe File created C:\Windows\bugMAKER.bat 1f4a44a94c5ae3eb5d51fa92e4c1a76d.exe File opened for modification C:\Windows\winhash_up.exez 1f4a44a94c5ae3eb5d51fa92e4c1a76d.exe File created C:\Windows\winhash_up.exe 1f4a44a94c5ae3eb5d51fa92e4c1a76d.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 1f4a44a94c5ae3eb5d51fa92e4c1a76d.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 1f4a44a94c5ae3eb5d51fa92e4c1a76d.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 1f4a44a94c5ae3eb5d51fa92e4c1a76d.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 1f4a44a94c5ae3eb5d51fa92e4c1a76d.exe File created C:\Windows\winhash_up.exez 1f4a44a94c5ae3eb5d51fa92e4c1a76d.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 1f4a44a94c5ae3eb5d51fa92e4c1a76d.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 1f4a44a94c5ae3eb5d51fa92e4c1a76d.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 1f4a44a94c5ae3eb5d51fa92e4c1a76d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4740 cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 468 wrote to memory of 4740 468 1f4a44a94c5ae3eb5d51fa92e4c1a76d.exe 19 PID 468 wrote to memory of 4740 468 1f4a44a94c5ae3eb5d51fa92e4c1a76d.exe 19 PID 468 wrote to memory of 4740 468 1f4a44a94c5ae3eb5d51fa92e4c1a76d.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f4a44a94c5ae3eb5d51fa92e4c1a76d.exe"C:\Users\Admin\AppData\Local\Temp\1f4a44a94c5ae3eb5d51fa92e4c1a76d.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:4740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD5e020f3c3c61f0caf46391548e41e2781
SHA18d1fbd6eb729b11e816114356723d570d4f20fa3
SHA256045ee169ae3a3b70c272aa7c2bbdbbf0f11ff6b03533572ae3506d554f99c2d5
SHA5129ced65a542fa61f42d50b937ec733b3b1cb014b29e48c9a4405a66fe044e34c6ff0d2e45fb7247ae0c7b2f20150624901ad9c2ab67ab22c5a162aa27d90199a1