Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2024 08:11
Static task
static1
Behavioral task
behavioral1
Sample
3c57069dafc8c8ebd5fb5c45cd35c386.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3c57069dafc8c8ebd5fb5c45cd35c386.exe
Resource
win10v2004-20231215-en
General
-
Target
3c57069dafc8c8ebd5fb5c45cd35c386.exe
-
Size
251KB
-
MD5
3c57069dafc8c8ebd5fb5c45cd35c386
-
SHA1
3203dc9ba643f68cd628730d36909501414b4581
-
SHA256
4e89eed5f37f8ad9fd1befce4222575938ec25cdb592af1979cff5469f1e795e
-
SHA512
24cd65fd062f502d90178db6f9804fdd3ae1f5c1e1b2c366767380ab006691c94a800ec0a8fae8efa8b182dbb25390a6f09f60825b45af4ff1e4a199ee237122
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8oveatQxJtrW:o68i3odBiTl2+TCU/+vePPZtkqxq
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 3c57069dafc8c8ebd5fb5c45cd35c386.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\bugMAKER.bat 3c57069dafc8c8ebd5fb5c45cd35c386.exe File created C:\Windows\winhash_up.exe 3c57069dafc8c8ebd5fb5c45cd35c386.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 3c57069dafc8c8ebd5fb5c45cd35c386.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 3c57069dafc8c8ebd5fb5c45cd35c386.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 3c57069dafc8c8ebd5fb5c45cd35c386.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 3c57069dafc8c8ebd5fb5c45cd35c386.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 3c57069dafc8c8ebd5fb5c45cd35c386.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 3c57069dafc8c8ebd5fb5c45cd35c386.exe File created C:\Windows\winhash_up.exez 3c57069dafc8c8ebd5fb5c45cd35c386.exe File opened for modification C:\Windows\winhash_up.exez 3c57069dafc8c8ebd5fb5c45cd35c386.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 3c57069dafc8c8ebd5fb5c45cd35c386.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 3c57069dafc8c8ebd5fb5c45cd35c386.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4716 cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4620 wrote to memory of 4716 4620 3c57069dafc8c8ebd5fb5c45cd35c386.exe 20 PID 4620 wrote to memory of 4716 4620 3c57069dafc8c8ebd5fb5c45cd35c386.exe 20 PID 4620 wrote to memory of 4716 4620 3c57069dafc8c8ebd5fb5c45cd35c386.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c57069dafc8c8ebd5fb5c45cd35c386.exe"C:\Users\Admin\AppData\Local\Temp\3c57069dafc8c8ebd5fb5c45cd35c386.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:4716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD533791c6b936409069dfca4ff610665ad
SHA17b6899ccdc78bb3e70070af9c57b090ed0b96184
SHA256606825081128805563a9ef4f8c2929b25a5a1ab00162caf4bbc25040b7a0d59f
SHA5124de5f6f2a7827cfee9acd0aab03f781cef5f722f5ecdc4a9fb15e7b63184ee12ff5b110ee6219bd14325e2b3f02ae40ca2b17032a6cf8eacf70a35fad706ac51