Analysis
-
max time kernel
131s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 18:03
Static task
static1
Behavioral task
behavioral1
Sample
7529815744bf63c794a0b4615fd85a15.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7529815744bf63c794a0b4615fd85a15.exe
Resource
win10v2004-20231222-en
General
-
Target
7529815744bf63c794a0b4615fd85a15.exe
-
Size
220KB
-
MD5
7529815744bf63c794a0b4615fd85a15
-
SHA1
eb19d2925180d4cb73755160a5f42b34d0414472
-
SHA256
da0466e2b11673085988f5759e21a235379f71b958c804dd3953043dc3725e5b
-
SHA512
2b241fee1e94134bee4c8c5ea5bc5665fb24297c512535eb442160f9c69df27c10263ac0aaf955db24a94dab3f7dd2bdf0dbca992283680af869e33daace91a9
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8VkgnYHfQlAL:o68i3odBiTl2+TCU//k8KfQlE
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 7529815744bf63c794a0b4615fd85a15.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon7.ico 7529815744bf63c794a0b4615fd85a15.exe File created C:\Windows\bugMAKER.bat 7529815744bf63c794a0b4615fd85a15.exe File opened for modification C:\Windows\winhash_up.exez 7529815744bf63c794a0b4615fd85a15.exe File created C:\Windows\winhash_up.exe 7529815744bf63c794a0b4615fd85a15.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 7529815744bf63c794a0b4615fd85a15.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 7529815744bf63c794a0b4615fd85a15.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 7529815744bf63c794a0b4615fd85a15.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 7529815744bf63c794a0b4615fd85a15.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 7529815744bf63c794a0b4615fd85a15.exe File created C:\Windows\winhash_up.exez 7529815744bf63c794a0b4615fd85a15.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 7529815744bf63c794a0b4615fd85a15.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 7529815744bf63c794a0b4615fd85a15.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 768 cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3204 wrote to memory of 768 3204 7529815744bf63c794a0b4615fd85a15.exe 86 PID 3204 wrote to memory of 768 3204 7529815744bf63c794a0b4615fd85a15.exe 86 PID 3204 wrote to memory of 768 3204 7529815744bf63c794a0b4615fd85a15.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\7529815744bf63c794a0b4615fd85a15.exe"C:\Users\Admin\AppData\Local\Temp\7529815744bf63c794a0b4615fd85a15.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD50455239aa0d819dac53864954c154a6a
SHA19c89dd38f098d19a79e92f6af6eb61ba1466a3b4
SHA256f7fc0f19cf84f03f38210d6878518b1a3c82b9954f68eb90500294a0d0575af9
SHA5127e1a81f9e732ed8dcbd3650089a1e38fa50367c06cd90e523a7adf604b5367a4ce6f376573820e1113990a9b6104f44c2abd2afdb515bb5e2421b1c48bcb90c7