Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 12:15
Static task
static1
Behavioral task
behavioral1
Sample
18371369208c0719ea47c33d7b358aac.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
18371369208c0719ea47c33d7b358aac.exe
Resource
win10v2004-20231222-en
General
-
Target
18371369208c0719ea47c33d7b358aac.exe
-
Size
218KB
-
MD5
18371369208c0719ea47c33d7b358aac
-
SHA1
93bf7c13e07c6905ba9834122b9cb2854b6e370d
-
SHA256
f35a731df65d32feabe4f69dae9f68a88df18d2e180db31cda4cc6b6f81d3eba
-
SHA512
078680ec8f04f2e453059886a261a4cc58e5cec966efe69e30e59b9e3fed7b4df6fd55eaea721411cb4f6e00b3cc7efe2978f50ce3d4787b2d0e235ffa58f3a9
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B89etkaZgxktZ:o68i3odBiTl2+TCU/EetkqxrqLck+
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 18371369208c0719ea47c33d7b358aac.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon2.ico 18371369208c0719ea47c33d7b358aac.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 18371369208c0719ea47c33d7b358aac.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 18371369208c0719ea47c33d7b358aac.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 18371369208c0719ea47c33d7b358aac.exe File created C:\Windows\winhash_up.exez 18371369208c0719ea47c33d7b358aac.exe File opened for modification C:\Windows\winhash_up.exez 18371369208c0719ea47c33d7b358aac.exe File created C:\Windows\winhash_up.exe 18371369208c0719ea47c33d7b358aac.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 18371369208c0719ea47c33d7b358aac.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 18371369208c0719ea47c33d7b358aac.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 18371369208c0719ea47c33d7b358aac.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 18371369208c0719ea47c33d7b358aac.exe File created C:\Windows\bugMAKER.bat 18371369208c0719ea47c33d7b358aac.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4244 cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4492 wrote to memory of 4244 4492 18371369208c0719ea47c33d7b358aac.exe 18 PID 4492 wrote to memory of 4244 4492 18371369208c0719ea47c33d7b358aac.exe 18 PID 4492 wrote to memory of 4244 4492 18371369208c0719ea47c33d7b358aac.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\18371369208c0719ea47c33d7b358aac.exe"C:\Users\Admin\AppData\Local\Temp\18371369208c0719ea47c33d7b358aac.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:4244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD53a817baf14b19b2d5fd1b20c57e214cf
SHA14f64f0593753ac01d9f93aa5aad57fcf38f9b7ae
SHA256bff862ec4fceb17926bef3b1693f63000c5c597afc3fd79569b5102715ac359d
SHA512bfb2d418e08fb3f0c7f83e11bf37c67882604454e3ade683f619fd7c017786fe867990c24f7c8cfd5dcbacace56a1ccd12cc1f598e83e434b0de208573a1e93f