Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2024, 09:38
Static task
static1
Behavioral task
behavioral1
Sample
a3745355a77df83c39e8a1087fdf10dd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a3745355a77df83c39e8a1087fdf10dd.exe
Resource
win10v2004-20240221-en
General
-
Target
a3745355a77df83c39e8a1087fdf10dd.exe
-
Size
175KB
-
MD5
a3745355a77df83c39e8a1087fdf10dd
-
SHA1
6e614dd8ee6dd14ac34442aebd0dc160f74d1a97
-
SHA256
02945a7a779f7ed38f6733b35a9bacf5b6e138dffe457f547f7474530b67cb5c
-
SHA512
d0bad4abf1d4039662602b55317f97aecd1a302a5875aa721edc4968d2f1df3ea88ead34ef11ef41ee2c995988b8dc7f06eb0f5bce9d412f52e05676ee78a636
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B87pjBFy0:o68i3odBiTl2+TCU/Wl
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1790404759-2178872477-2616469472-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" a3745355a77df83c39e8a1087fdf10dd.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon14.ico a3745355a77df83c39e8a1087fdf10dd.exe File created C:\Windows\winhash_up.exez a3745355a77df83c39e8a1087fdf10dd.exe File created C:\Windows\winhash_up.exe a3745355a77df83c39e8a1087fdf10dd.exe File created C:\Windows\SHARE_TEMP\Icon3.ico a3745355a77df83c39e8a1087fdf10dd.exe File created C:\Windows\SHARE_TEMP\Icon6.ico a3745355a77df83c39e8a1087fdf10dd.exe File created C:\Windows\SHARE_TEMP\Icon10.ico a3745355a77df83c39e8a1087fdf10dd.exe File created C:\Windows\SHARE_TEMP\Icon12.ico a3745355a77df83c39e8a1087fdf10dd.exe File opened for modification C:\Windows\winhash_up.exez a3745355a77df83c39e8a1087fdf10dd.exe File created C:\Windows\SHARE_TEMP\Icon2.ico a3745355a77df83c39e8a1087fdf10dd.exe File created C:\Windows\SHARE_TEMP\Icon5.ico a3745355a77df83c39e8a1087fdf10dd.exe File created C:\Windows\SHARE_TEMP\Icon7.ico a3745355a77df83c39e8a1087fdf10dd.exe File created C:\Windows\bugMAKER.bat a3745355a77df83c39e8a1087fdf10dd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4976 cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3084 wrote to memory of 4976 3084 a3745355a77df83c39e8a1087fdf10dd.exe 85 PID 3084 wrote to memory of 4976 3084 a3745355a77df83c39e8a1087fdf10dd.exe 85 PID 3084 wrote to memory of 4976 3084 a3745355a77df83c39e8a1087fdf10dd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3745355a77df83c39e8a1087fdf10dd.exe"C:\Users\Admin\AppData\Local\Temp\a3745355a77df83c39e8a1087fdf10dd.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:4976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD57439a45000fe05f1524fd39876c5ecc3
SHA1c7cf6af1f967ec572cab889092412b4deaf08177
SHA256f39b6a3e07b576d532aa5da18a689781a17d9e195ff71681ab99a72463c804ac
SHA512a450be68c57986a82721eb1fd82518a26e90f09de7df4c9dc1c29a434cc408be6d2a9a41af48aac101cb9e4258de235d28cbf3d5ac1018b405f54b4835bdbfb1