Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2024 15:03
Static task
static1
Behavioral task
behavioral1
Sample
56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe
Resource
win10v2004-20231215-en
General
-
Target
56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe
-
Size
227KB
-
MD5
56c7c8dbb0eb3a743a96bc2b4ccbccd6
-
SHA1
98da4979bebfcbd7212db25f857e21947aa49ba5
-
SHA256
1246d67d866b350856f273187beaf829b6bcba477e7e4302b89cb16ae5fc5299
-
SHA512
ccedab420d4d625c17c0f28d9cc52a5df62091eda3bc18683f6be36cd731541f5aba3886e7ca356a6ca7b05e818d668800777b0a7b973530f7680977d3dea1bd
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8FpSkgnYEkgJ:o68i3odBiTl2+TCU/4k8nkM
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\winhash_up.exe 56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe File created C:\Windows\bugMAKER.bat 56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe File opened for modification C:\Windows\winhash_up.exez 56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe File created C:\Windows\winhash_up.exez 56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3428 cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4240 wrote to memory of 3428 4240 56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe 88 PID 4240 wrote to memory of 3428 4240 56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe 88 PID 4240 wrote to memory of 3428 4240 56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe"C:\Users\Admin\AppData\Local\Temp\56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:3428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD558427bf50a517286de9014d3c49edf24
SHA1d05349924e62f3d19cee92b75dc1031cbb39755d
SHA256589cceb08ae9a4064c2946470d50f56af073aa2535a37a293f81978000a1eef4
SHA5126b765a34dd5aac9a19c0cc347b41e6e45b0f31f69a906be175e0f19827503568a14ab5a9f5aa2cf22c6709750b0ec41512d731ac30a4b101587ecb760e9e8d27