Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 19:32
Static task
static1
Behavioral task
behavioral1
Sample
3ade5537c1840f96bad09cb8b3e03013.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3ade5537c1840f96bad09cb8b3e03013.exe
Resource
win10v2004-20231215-en
General
-
Target
3ade5537c1840f96bad09cb8b3e03013.exe
-
Size
204KB
-
MD5
3ade5537c1840f96bad09cb8b3e03013
-
SHA1
2fa173dd6a444b8f402a0026e3f2862c3372da11
-
SHA256
ae32160e0e36afcdc144c05557d3df0e9255ccee0e99c294badbae99f42ba223
-
SHA512
0058414b993813c50b07e176d640b4b3cf172b3c6789a8d0045a991070f3dd4eb441a8b4977f9f1d33a12822b37c304a26e9c1e4b8cdd5088bb54cfbfd312995
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8ltkaZgxktEX:o68i3odBiTl2+TCU/LtkqxrK
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 3ade5537c1840f96bad09cb8b3e03013.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\winhash_up.exe 3ade5537c1840f96bad09cb8b3e03013.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 3ade5537c1840f96bad09cb8b3e03013.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 3ade5537c1840f96bad09cb8b3e03013.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 3ade5537c1840f96bad09cb8b3e03013.exe File created C:\Windows\bugMAKER.bat 3ade5537c1840f96bad09cb8b3e03013.exe File created C:\Windows\winhash_up.exez 3ade5537c1840f96bad09cb8b3e03013.exe File opened for modification C:\Windows\winhash_up.exez 3ade5537c1840f96bad09cb8b3e03013.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 3ade5537c1840f96bad09cb8b3e03013.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 3ade5537c1840f96bad09cb8b3e03013.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 3ade5537c1840f96bad09cb8b3e03013.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 3ade5537c1840f96bad09cb8b3e03013.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 3ade5537c1840f96bad09cb8b3e03013.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4288 cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3516 wrote to memory of 4288 3516 3ade5537c1840f96bad09cb8b3e03013.exe 26 PID 3516 wrote to memory of 4288 3516 3ade5537c1840f96bad09cb8b3e03013.exe 26 PID 3516 wrote to memory of 4288 3516 3ade5537c1840f96bad09cb8b3e03013.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ade5537c1840f96bad09cb8b3e03013.exe"C:\Users\Admin\AppData\Local\Temp\3ade5537c1840f96bad09cb8b3e03013.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:4288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD5880ba02efc7de7b46f0f79a64b79af47
SHA19e5fac20fce9c4949b58fef9d9a64c695ddba2d1
SHA25681437c4b64e17957877421baab1a0123ea83270ec8f8b0542b9517149f3a2e0c
SHA5122c7c114a853d71a4c718637f12ab5f3788b3c7ae5cf1ed3513318b43f2de711d365605f0218835d68c20aca898441c9aa5db934b25633e5d2416ff3da5362c51