Analysis
-
max time kernel
138s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
17/01/2024, 19:29
Static task
static1
Behavioral task
behavioral1
Sample
63691f8e1346e069e1f6b0d57d21ff26.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
63691f8e1346e069e1f6b0d57d21ff26.exe
Resource
win10v2004-20231222-en
General
-
Target
63691f8e1346e069e1f6b0d57d21ff26.exe
-
Size
229KB
-
MD5
63691f8e1346e069e1f6b0d57d21ff26
-
SHA1
24a173a2555510732e67c510733278e257d561bb
-
SHA256
78053e0b64756cacd200eca560db10a5c215a909ba32ca453d09a4f45d62146c
-
SHA512
cecdcc6af4f7f8333a6d79ba90df5374c5e2b52fb833e585c540712e1b7cf73acd00a6c90c9245718bff2b5f313d06bec34e1a8860e2e9c00b7a989e0b48b622
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8qtkaZgxktEv:o68i3odBiTl2+TCU/MtkqxrqLckP+6
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 63691f8e1346e069e1f6b0d57d21ff26.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon5.ico 63691f8e1346e069e1f6b0d57d21ff26.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 63691f8e1346e069e1f6b0d57d21ff26.exe File created C:\Windows\winhash_up.exe 63691f8e1346e069e1f6b0d57d21ff26.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 63691f8e1346e069e1f6b0d57d21ff26.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 63691f8e1346e069e1f6b0d57d21ff26.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 63691f8e1346e069e1f6b0d57d21ff26.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 63691f8e1346e069e1f6b0d57d21ff26.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 63691f8e1346e069e1f6b0d57d21ff26.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 63691f8e1346e069e1f6b0d57d21ff26.exe File created C:\Windows\bugMAKER.bat 63691f8e1346e069e1f6b0d57d21ff26.exe File created C:\Windows\winhash_up.exez 63691f8e1346e069e1f6b0d57d21ff26.exe File opened for modification C:\Windows\winhash_up.exez 63691f8e1346e069e1f6b0d57d21ff26.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 1676 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4980 cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4772 wrote to memory of 4980 4772 63691f8e1346e069e1f6b0d57d21ff26.exe 87 PID 4772 wrote to memory of 4980 4772 63691f8e1346e069e1f6b0d57d21ff26.exe 87 PID 4772 wrote to memory of 4980 4772 63691f8e1346e069e1f6b0d57d21ff26.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\63691f8e1346e069e1f6b0d57d21ff26.exe"C:\Users\Admin\AppData\Local\Temp\63691f8e1346e069e1f6b0d57d21ff26.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:4980
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:1420
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD5d9796143b7e07144fd8e3d126d23f637
SHA1d19582b06f29ac3d1534f36e079b8742c98feead
SHA2567f564de6dca2bbdf7b8bbfe7db87a907de19aed5c30ea818192fef49b4326d74
SHA5120976aeaa962df56a39c5468cf31f6c351d69a35bda6009efb00273c7b9702fa2d4c1a9ac150008b983e58590d072bb60e906a56eacb4ff234c069ed5504c9d49