Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2024, 21:52
Static task
static1
Behavioral task
behavioral1
Sample
787b16aff87a8ac4520d26aab49ceb2f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
787b16aff87a8ac4520d26aab49ceb2f.exe
Resource
win10v2004-20231215-en
General
-
Target
787b16aff87a8ac4520d26aab49ceb2f.exe
-
Size
200KB
-
MD5
787b16aff87a8ac4520d26aab49ceb2f
-
SHA1
270428ba8ffc05e0eae6c552db2d5289a75c53c2
-
SHA256
b8d6d51221f999c9d2362ded7e765e582032caf319136cb65f2ce5350e9ca3bf
-
SHA512
c5efdebb525ce8eac2810107959646da4cd926db99e6cdadb6e9a9b4d1558f176a1cf85817912e3fe6d87eab6fb5b7581890822742b073261a932af48f0dc3b4
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/g8spjBFy11Aw6:o68i3odBiTl2+TCU/ahuhuIpw
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 787b16aff87a8ac4520d26aab49ceb2f.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon12.ico 787b16aff87a8ac4520d26aab49ceb2f.exe File created C:\Windows\bugMAKER.bat 787b16aff87a8ac4520d26aab49ceb2f.exe File created C:\Windows\winhash_up.exez 787b16aff87a8ac4520d26aab49ceb2f.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 787b16aff87a8ac4520d26aab49ceb2f.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 787b16aff87a8ac4520d26aab49ceb2f.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 787b16aff87a8ac4520d26aab49ceb2f.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 787b16aff87a8ac4520d26aab49ceb2f.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 787b16aff87a8ac4520d26aab49ceb2f.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 787b16aff87a8ac4520d26aab49ceb2f.exe File opened for modification C:\Windows\winhash_up.exez 787b16aff87a8ac4520d26aab49ceb2f.exe File created C:\Windows\winhash_up.exe 787b16aff87a8ac4520d26aab49ceb2f.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 787b16aff87a8ac4520d26aab49ceb2f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1560 wrote to memory of 3192 1560 787b16aff87a8ac4520d26aab49ceb2f.exe 84 PID 1560 wrote to memory of 3192 1560 787b16aff87a8ac4520d26aab49ceb2f.exe 84 PID 1560 wrote to memory of 3192 1560 787b16aff87a8ac4520d26aab49ceb2f.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\787b16aff87a8ac4520d26aab49ceb2f.exe"C:\Users\Admin\AppData\Local\Temp\787b16aff87a8ac4520d26aab49ceb2f.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵
- Checks computer location settings
PID:3192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD5921c86d3c47c8ae80481a0e1b8636ab8
SHA181cca2b02d32158713008437ff49378a05fc9888
SHA256f712f4e3ead1d5b85ca191f38dba0b0d60bd8f9f696f77a93ca5123dfbb86bbe
SHA51296029715cbba22c3f81792a7a9565add61f130c68bdf93f3be069b03dfa77f984a500750c06baf89afebdf9b8d9edaa4cd37c6b28e6db5df58bbf72dcc25bba8