Analysis
-
max time kernel
147s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 00:18
Static task
static1
Behavioral task
behavioral1
Sample
084970997116e532b9d7519e0da42a02.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
084970997116e532b9d7519e0da42a02.exe
Resource
win10v2004-20231222-en
General
-
Target
084970997116e532b9d7519e0da42a02.exe
-
Size
217KB
-
MD5
084970997116e532b9d7519e0da42a02
-
SHA1
b5c73d2c9accf08b27bb912ac368d99bbc7ca996
-
SHA256
8beaa8e6c6a6ea7a82feed9384efcd1521a674b380baf521c79c6362888b7b30
-
SHA512
bc7ace0cfd49a36f06906de5ecd3439578be7eda91bd7b9242c5ab8ebf436701512e137f86e8ddf99f39d9b0b2677bd7fb30a07c8ed98470dbfa9ea962e7e28d
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8tkgnYHfQlAo:o68i3odBiTl2+TCU/7k8KfQlZ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 084970997116e532b9d7519e0da42a02.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File opened for modification C:\Windows\winhash_up.exez 084970997116e532b9d7519e0da42a02.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 084970997116e532b9d7519e0da42a02.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 084970997116e532b9d7519e0da42a02.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 084970997116e532b9d7519e0da42a02.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 084970997116e532b9d7519e0da42a02.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 084970997116e532b9d7519e0da42a02.exe File created C:\Windows\bugMAKER.bat 084970997116e532b9d7519e0da42a02.exe File created C:\Windows\winhash_up.exez 084970997116e532b9d7519e0da42a02.exe File created C:\Windows\winhash_up.exe 084970997116e532b9d7519e0da42a02.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 084970997116e532b9d7519e0da42a02.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 084970997116e532b9d7519e0da42a02.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 084970997116e532b9d7519e0da42a02.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 228 cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1492 wrote to memory of 228 1492 084970997116e532b9d7519e0da42a02.exe 33 PID 1492 wrote to memory of 228 1492 084970997116e532b9d7519e0da42a02.exe 33 PID 1492 wrote to memory of 228 1492 084970997116e532b9d7519e0da42a02.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\084970997116e532b9d7519e0da42a02.exe"C:\Users\Admin\AppData\Local\Temp\084970997116e532b9d7519e0da42a02.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD536bad87bc64621b5c2d45c32455a5912
SHA118dd09aeb821ce7b7af4287cae93a68b2328d8fc
SHA25697473f67e317c6f31e783d94413127984e5ac63f340408c0ccca8a3f33da50b0
SHA512d5fa930c91b5403a2804eab51df6a58d98ac7e228e4e208ae90a70f2007755776fb2c1fd2e720e9d9422c88f42b45ed46e16fa9ef5279bec89e870381b38c1de