Analysis
-
max time kernel
90s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 00:34
Static task
static1
Behavioral task
behavioral1
Sample
66708a974cc6704c6adf93961292fca1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
66708a974cc6704c6adf93961292fca1.exe
Resource
win10v2004-20231215-en
General
-
Target
66708a974cc6704c6adf93961292fca1.exe
-
Size
190KB
-
MD5
66708a974cc6704c6adf93961292fca1
-
SHA1
581e34d5774d1787077ce2ed93f4322518078a60
-
SHA256
52463daf8a4c26d54cd4e00841fd31ec071367d7e9228b427d02e0803c41c07e
-
SHA512
9adab152807f9e851b16b73e7f56363c9894a3638396123f35b67abbfccf8bbaf12e2b8c6c1e8a562e3268e99cf87a8b923e85979fcd93d8bf802448c58d36e4
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B89tEkgnh:o68i3odBiTl2+TCU/stEk8h
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 66708a974cc6704c6adf93961292fca1.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\bugMAKER.bat 66708a974cc6704c6adf93961292fca1.exe File created C:\Windows\winhash_up.exez 66708a974cc6704c6adf93961292fca1.exe File opened for modification C:\Windows\winhash_up.exez 66708a974cc6704c6adf93961292fca1.exe File created C:\Windows\winhash_up.exe 66708a974cc6704c6adf93961292fca1.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 66708a974cc6704c6adf93961292fca1.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 66708a974cc6704c6adf93961292fca1.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 66708a974cc6704c6adf93961292fca1.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 66708a974cc6704c6adf93961292fca1.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 66708a974cc6704c6adf93961292fca1.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 66708a974cc6704c6adf93961292fca1.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 66708a974cc6704c6adf93961292fca1.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 66708a974cc6704c6adf93961292fca1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4824 cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 116 wrote to memory of 4824 116 66708a974cc6704c6adf93961292fca1.exe 86 PID 116 wrote to memory of 4824 116 66708a974cc6704c6adf93961292fca1.exe 86 PID 116 wrote to memory of 4824 116 66708a974cc6704c6adf93961292fca1.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\66708a974cc6704c6adf93961292fca1.exe"C:\Users\Admin\AppData\Local\Temp\66708a974cc6704c6adf93961292fca1.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:4824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD57e0ffc598be85c34ad9ad18ca1cc04b0
SHA1ae948ea80111f823ffd59349e1d5e6b29e213065
SHA2564360d19c2a52bc4b14352cfc1c92444d7357b20bc84cdb2cae9557fed8389dfb
SHA5122cfb70d2bb90c750adac09bc4c184c63761f2b33ab0871f367bb6027f566b466354f1cdfb93e9ba98f77a31e3222e3895be548591d2d32cf246591c55fdf60c2