Analysis
-
max time kernel
91s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
13-02-2024 04:53
Static task
static1
Behavioral task
behavioral1
Sample
98860f7832d3533ce050b81aac42e2bc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
98860f7832d3533ce050b81aac42e2bc.exe
Resource
win10v2004-20231222-en
General
-
Target
98860f7832d3533ce050b81aac42e2bc.exe
-
Size
253KB
-
MD5
98860f7832d3533ce050b81aac42e2bc
-
SHA1
55b08d28bcbaa53cf3b7508dca9f4e3cdd18eeda
-
SHA256
527771d7d660fa0fcdb51d4d19602d8c60c420f8a594f0d9b9aa00670105f0d7
-
SHA512
27bf828beb5d2cf3edffcb2b20729ce7ef0a9151fde2efe722ed20e3a940b36b60e86ce03e44e1c37a0f8065aa8e9c0a4ef4bfe23f85bef6acb93cacd2ecf7d9
-
SSDEEP
6144:o68i3odBiTl2+TCU/BtkqxrqLck9k8KfI:TNodBiTI+TpBDrVk9AI
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 98860f7832d3533ce050b81aac42e2bc.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\winhash_up.exez 98860f7832d3533ce050b81aac42e2bc.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 98860f7832d3533ce050b81aac42e2bc.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 98860f7832d3533ce050b81aac42e2bc.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 98860f7832d3533ce050b81aac42e2bc.exe File created C:\Windows\bugMAKER.bat 98860f7832d3533ce050b81aac42e2bc.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 98860f7832d3533ce050b81aac42e2bc.exe File opened for modification C:\Windows\winhash_up.exez 98860f7832d3533ce050b81aac42e2bc.exe File created C:\Windows\winhash_up.exe 98860f7832d3533ce050b81aac42e2bc.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 98860f7832d3533ce050b81aac42e2bc.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 98860f7832d3533ce050b81aac42e2bc.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 98860f7832d3533ce050b81aac42e2bc.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 98860f7832d3533ce050b81aac42e2bc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1208 cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 752 wrote to memory of 1208 752 98860f7832d3533ce050b81aac42e2bc.exe 85 PID 752 wrote to memory of 1208 752 98860f7832d3533ce050b81aac42e2bc.exe 85 PID 752 wrote to memory of 1208 752 98860f7832d3533ce050b81aac42e2bc.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\98860f7832d3533ce050b81aac42e2bc.exe"C:\Users\Admin\AppData\Local\Temp\98860f7832d3533ce050b81aac42e2bc.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:1208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD5c58cc61ce3e624c99d05bd5bec580b32
SHA1651e7b2c9c0fc550fe3244230c0c105bf1d91d15
SHA256b888a6bec437291b8fa3a29b79ca4044c58dd7897482ad7a9458eaee2bb5be3a
SHA5127c2c9716051c6a751a4cdfd904b5fa2f7c0996096b332016da9aecb7cc341c55fbfb0d25707e4f3f3227471719fcf620f7a3d493b95773a3af7ca8cfb37b1c46