Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2024 03:17
Static task
static1
Behavioral task
behavioral1
Sample
5262ffab7aead76e03397d04e94360e6.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5262ffab7aead76e03397d04e94360e6.exe
Resource
win10v2004-20231222-en
General
-
Target
5262ffab7aead76e03397d04e94360e6.exe
-
Size
240KB
-
MD5
5262ffab7aead76e03397d04e94360e6
-
SHA1
7c14a86a0cc5a263007421bbe10a81f883efcdc7
-
SHA256
036b88b2d752c7f1e280f374b86eb9e51d16398931d6473d8e7c13c59ac658f9
-
SHA512
51e8b74dfc62aec7fe90a4a65cdd6b2c8552811e73475a3af55eba8d8af88d76684c8a5907e4a2bb0674e9e08af28e445fbe21fdd00eb26da2d693078883862a
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8JDpjBFy11Ag:o68i3odBiTl2+TCU//phuO1thzvhuhF
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 5262ffab7aead76e03397d04e94360e6.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\winhash_up.exe 5262ffab7aead76e03397d04e94360e6.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 5262ffab7aead76e03397d04e94360e6.exe File created C:\Windows\bugMAKER.bat 5262ffab7aead76e03397d04e94360e6.exe File created C:\Windows\winhash_up.exez 5262ffab7aead76e03397d04e94360e6.exe File opened for modification C:\Windows\winhash_up.exez 5262ffab7aead76e03397d04e94360e6.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 5262ffab7aead76e03397d04e94360e6.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 5262ffab7aead76e03397d04e94360e6.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 5262ffab7aead76e03397d04e94360e6.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 5262ffab7aead76e03397d04e94360e6.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 5262ffab7aead76e03397d04e94360e6.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 5262ffab7aead76e03397d04e94360e6.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 5262ffab7aead76e03397d04e94360e6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3876 cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3880 wrote to memory of 3876 3880 5262ffab7aead76e03397d04e94360e6.exe 20 PID 3880 wrote to memory of 3876 3880 5262ffab7aead76e03397d04e94360e6.exe 20 PID 3880 wrote to memory of 3876 3880 5262ffab7aead76e03397d04e94360e6.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\5262ffab7aead76e03397d04e94360e6.exe"C:\Users\Admin\AppData\Local\Temp\5262ffab7aead76e03397d04e94360e6.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:3876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD5144c4c1c47373ccdcd89a19aec82c1ed
SHA189039470af61fd1c8e300b3f18f0292117b3560a
SHA256fd11df6a332b3959fe745f9df5aca3e8b40c69d17f13a3f1fa8090d061830f26
SHA5126772e2900189f2bca404dd66a0e9ecd0c4f6552356e6716cddb6ddd6f44f147415ea6d2155954553c21fe9f544fc8dd79becfd062f20d1fca11ef6b651766809