Analysis
-
max time kernel
168s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2024 12:51
Static task
static1
Behavioral task
behavioral1
Sample
43ba79a919a8033f7e8edf5d3fb9b952.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
43ba79a919a8033f7e8edf5d3fb9b952.exe
Resource
win10v2004-20231215-en
General
-
Target
43ba79a919a8033f7e8edf5d3fb9b952.exe
-
Size
472KB
-
MD5
43ba79a919a8033f7e8edf5d3fb9b952
-
SHA1
03c1fc41195b133903f88212c7bbbf361c24e953
-
SHA256
ad93d0b33d113936122bfdb3cf7ad5faf1162295885718a01cded407ac7a82db
-
SHA512
e5de06da444ab62a9212ffdaf316500acb639b8528e6e24704b4c72726010269c48af4cac472e52fc9f2cad7d16b2b016cba6753dea02610d8d440c0d24c5af4
-
SSDEEP
12288:TNodBiTI+TpDA6EZO7KUQRZ66z24VZbdrpgrXN2LWzmidN:ZoPD+TpD3vKU6Z66z24VZbFpgJ2LWzm+
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 43ba79a919a8033f7e8edf5d3fb9b952.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon3.ico 43ba79a919a8033f7e8edf5d3fb9b952.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 43ba79a919a8033f7e8edf5d3fb9b952.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 43ba79a919a8033f7e8edf5d3fb9b952.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 43ba79a919a8033f7e8edf5d3fb9b952.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 43ba79a919a8033f7e8edf5d3fb9b952.exe File created C:\Windows\winhash_up.exez 43ba79a919a8033f7e8edf5d3fb9b952.exe File opened for modification C:\Windows\winhash_up.exez 43ba79a919a8033f7e8edf5d3fb9b952.exe File created C:\Windows\winhash_up.exe 43ba79a919a8033f7e8edf5d3fb9b952.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 43ba79a919a8033f7e8edf5d3fb9b952.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 43ba79a919a8033f7e8edf5d3fb9b952.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 43ba79a919a8033f7e8edf5d3fb9b952.exe File created C:\Windows\bugMAKER.bat 43ba79a919a8033f7e8edf5d3fb9b952.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3596 cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4316 wrote to memory of 3596 4316 43ba79a919a8033f7e8edf5d3fb9b952.exe 92 PID 4316 wrote to memory of 3596 4316 43ba79a919a8033f7e8edf5d3fb9b952.exe 92 PID 4316 wrote to memory of 3596 4316 43ba79a919a8033f7e8edf5d3fb9b952.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\43ba79a919a8033f7e8edf5d3fb9b952.exe"C:\Users\Admin\AppData\Local\Temp\43ba79a919a8033f7e8edf5d3fb9b952.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:3596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD599c4d67fab434afa4b8a3eca4295fd12
SHA1ed4bd5f3a355c36cde8f42ca5fa678d0eb44fb6d
SHA256814c520aac8b4f24c809b1f921ec07dd43aa73ce19c5de858d065fb0b1bb0142
SHA5120f624a88eaa0a8cc5677349d9e3e63bd429f724cfa1b7991c89ee03f8477016a28d4519373b660c9123c867692a62de20e451431e774970c924d8ffd0016aa36