Analysis
-
max time kernel
91s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2024 16:39
Static task
static1
Behavioral task
behavioral1
Sample
700c39ad5466ef53f08e5ed53a43f0c3.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
700c39ad5466ef53f08e5ed53a43f0c3.exe
Resource
win10v2004-20231222-en
General
-
Target
700c39ad5466ef53f08e5ed53a43f0c3.exe
-
Size
238KB
-
MD5
700c39ad5466ef53f08e5ed53a43f0c3
-
SHA1
a8b1e75c0617a8ae9702cfb536e6d7f0da8cb04a
-
SHA256
268516dcb517fc7e4f6bb70f860d27f29b08dbf3451afc994cf070a125ba7ed9
-
SHA512
21369f22b4e012efb300f7285604dfd33bba5352086ae71ea32ad721868cc7342529e0600e9938d0796e23d1696547d36e2a4f94f517f9dea887e6c05c5f9c48
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B8IkgnYHfQlAq:o68i3odBiTl2+TCU/Zk8KfQlKk8e
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 700c39ad5466ef53f08e5ed53a43f0c3.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\winhash_up.exez 700c39ad5466ef53f08e5ed53a43f0c3.exe File opened for modification C:\Windows\winhash_up.exez 700c39ad5466ef53f08e5ed53a43f0c3.exe File created C:\Windows\winhash_up.exe 700c39ad5466ef53f08e5ed53a43f0c3.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 700c39ad5466ef53f08e5ed53a43f0c3.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 700c39ad5466ef53f08e5ed53a43f0c3.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 700c39ad5466ef53f08e5ed53a43f0c3.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 700c39ad5466ef53f08e5ed53a43f0c3.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 700c39ad5466ef53f08e5ed53a43f0c3.exe File created C:\Windows\bugMAKER.bat 700c39ad5466ef53f08e5ed53a43f0c3.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 700c39ad5466ef53f08e5ed53a43f0c3.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 700c39ad5466ef53f08e5ed53a43f0c3.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 700c39ad5466ef53f08e5ed53a43f0c3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2768 cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3080 wrote to memory of 2768 3080 700c39ad5466ef53f08e5ed53a43f0c3.exe 85 PID 3080 wrote to memory of 2768 3080 700c39ad5466ef53f08e5ed53a43f0c3.exe 85 PID 3080 wrote to memory of 2768 3080 700c39ad5466ef53f08e5ed53a43f0c3.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\700c39ad5466ef53f08e5ed53a43f0c3.exe"C:\Users\Admin\AppData\Local\Temp\700c39ad5466ef53f08e5ed53a43f0c3.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD59e4d5d196c8e2f6777a11c5bca41acc3
SHA1eda69d0f52902d8839a95464ff17fddd84d74444
SHA25668ec54d07a58d957a96d3ea63fc63338717894d3b506f1fca39a5105d57cf3cb
SHA51281a59296fa75f10c1661cc60e839615d6861615e79c75a0b221a46d30493b4bf062e336774c732ce88758a1dd13347cc9b04941769e1b6460e1b26ed2d238b57