Analysis
-
max time kernel
91s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2024, 09:52
Static task
static1
Behavioral task
behavioral1
Sample
79ed5197d319cab2ce952076a95047f1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
79ed5197d319cab2ce952076a95047f1.exe
Resource
win10v2004-20231222-en
General
-
Target
79ed5197d319cab2ce952076a95047f1.exe
-
Size
212KB
-
MD5
79ed5197d319cab2ce952076a95047f1
-
SHA1
580c1f92ba14e842b99cb1db2d35d31674af7737
-
SHA256
e38ed005ba68150ffe41232a97aaa1c93482eeb71aca125051883e559997f381
-
SHA512
1a2c9dd55b5141b1e1655c8f2cc2f3db0e7fc1afdedf095adb411e993ff7ab48c10bb33775cbcf4dd27203d51ac99f4a428624d2e55215caf7128def5940f0ac
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8AkgnYnpjBFy:o68i3odBiTl2+TCU/Wk88huhuY
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 79ed5197d319cab2ce952076a95047f1.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon12.ico 79ed5197d319cab2ce952076a95047f1.exe File created C:\Windows\winhash_up.exez 79ed5197d319cab2ce952076a95047f1.exe File created C:\Windows\winhash_up.exe 79ed5197d319cab2ce952076a95047f1.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 79ed5197d319cab2ce952076a95047f1.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 79ed5197d319cab2ce952076a95047f1.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 79ed5197d319cab2ce952076a95047f1.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 79ed5197d319cab2ce952076a95047f1.exe File created C:\Windows\bugMAKER.bat 79ed5197d319cab2ce952076a95047f1.exe File opened for modification C:\Windows\winhash_up.exez 79ed5197d319cab2ce952076a95047f1.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 79ed5197d319cab2ce952076a95047f1.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 79ed5197d319cab2ce952076a95047f1.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 79ed5197d319cab2ce952076a95047f1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4272 cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4848 wrote to memory of 4272 4848 79ed5197d319cab2ce952076a95047f1.exe 84 PID 4848 wrote to memory of 4272 4848 79ed5197d319cab2ce952076a95047f1.exe 84 PID 4848 wrote to memory of 4272 4848 79ed5197d319cab2ce952076a95047f1.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\79ed5197d319cab2ce952076a95047f1.exe"C:\Users\Admin\AppData\Local\Temp\79ed5197d319cab2ce952076a95047f1.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:4272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD5b32900b65877b04e12fea9cb005f3762
SHA132a717042aec2e5322c0bef13e0627ee66810b88
SHA2562d5678d5536b7f05cf8ad58514de21a36077b4f8596dde9f1762bd45072efd73
SHA512d836145ea17ff5c5bd72be91bdb9ab9459f19c6a3324b8cba11ed348d8009f263fbb5ff6814e8ad7087ba5232ef4f1788a6a81678964b8802c9432d0ca16c3d9