Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 12:20
Static task
static1
Behavioral task
behavioral1
Sample
184e61fe9e1fa64647838f99384013a1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
184e61fe9e1fa64647838f99384013a1.exe
Resource
win10v2004-20231215-en
General
-
Target
184e61fe9e1fa64647838f99384013a1.exe
-
Size
245KB
-
MD5
184e61fe9e1fa64647838f99384013a1
-
SHA1
a598cccd9742105e7b4c01927f0e138fcee361fd
-
SHA256
ef7b6b21e87d57e415ed3c926bda9acda39a2dd2139b8840affc6b9003229a05
-
SHA512
2c0b3c592012119cfcfff21ebf59f8ac99bacdd120df1acf3183d0bfdfbd92c0dc12304da4753f02138d9f2422cd6a5def4e38f190884f5e3a7508b22d206af1
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8KkgnYHfQlAH:o68i3odBiTl2+TCU/Ik8KfQlEe
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 184e61fe9e1fa64647838f99384013a1.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon7.ico 184e61fe9e1fa64647838f99384013a1.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 184e61fe9e1fa64647838f99384013a1.exe File created C:\Windows\bugMAKER.bat 184e61fe9e1fa64647838f99384013a1.exe File created C:\Windows\winhash_up.exez 184e61fe9e1fa64647838f99384013a1.exe File opened for modification C:\Windows\winhash_up.exez 184e61fe9e1fa64647838f99384013a1.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 184e61fe9e1fa64647838f99384013a1.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 184e61fe9e1fa64647838f99384013a1.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 184e61fe9e1fa64647838f99384013a1.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 184e61fe9e1fa64647838f99384013a1.exe File created C:\Windows\winhash_up.exe 184e61fe9e1fa64647838f99384013a1.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 184e61fe9e1fa64647838f99384013a1.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 184e61fe9e1fa64647838f99384013a1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2364 cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4712 wrote to memory of 2364 4712 184e61fe9e1fa64647838f99384013a1.exe 89 PID 4712 wrote to memory of 2364 4712 184e61fe9e1fa64647838f99384013a1.exe 89 PID 4712 wrote to memory of 2364 4712 184e61fe9e1fa64647838f99384013a1.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\184e61fe9e1fa64647838f99384013a1.exe"C:\Users\Admin\AppData\Local\Temp\184e61fe9e1fa64647838f99384013a1.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:2364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD5d9ecd331cabdf3bb2256122c512381f2
SHA10c6cbbc9672df004e0be0d0f7f9604d33d220ee5
SHA256a9672675c92f8cd1623e7cc90996829604dde3bb387f25a397d5cc12fd89c67a
SHA512dec8744bb626cf8b11b2c7eceba54dbf32ea171efd5ba338f852a9dd5479d3b6f5c7a4de390eb07dddfe939da2b7d8c5c4b01d3a1a7f74537a55aa78646d89ec