Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-02-2024 21:31
Static task
static1
Behavioral task
behavioral1
Sample
aa34574d2b2f3e48aa0fde2a8357c575.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
aa34574d2b2f3e48aa0fde2a8357c575.exe
Resource
win10v2004-20240226-en
General
-
Target
aa34574d2b2f3e48aa0fde2a8357c575.exe
-
Size
162KB
-
MD5
aa34574d2b2f3e48aa0fde2a8357c575
-
SHA1
e0c3feeb12ccc3428b2b0377941cef89261677d9
-
SHA256
4ad95b71495954022a78f7afb993d08cc920b203b91c3769b9e3e00cca31bac8
-
SHA512
71b6834e36759bd19cf269197c826e70c7bee383d110a840189f5a9db4d8b3a5203e30797829150ed07547e43d2b499f132a3362414cd0c5a769cbed7793e935
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B8e:o68i3odBiTl2+TCU/R
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" aa34574d2b2f3e48aa0fde2a8357c575.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon10.ico aa34574d2b2f3e48aa0fde2a8357c575.exe File created C:\Windows\SHARE_TEMP\Icon14.ico aa34574d2b2f3e48aa0fde2a8357c575.exe File created C:\Windows\winhash_up.exez aa34574d2b2f3e48aa0fde2a8357c575.exe File created C:\Windows\SHARE_TEMP\Icon2.ico aa34574d2b2f3e48aa0fde2a8357c575.exe File created C:\Windows\SHARE_TEMP\Icon3.ico aa34574d2b2f3e48aa0fde2a8357c575.exe File created C:\Windows\SHARE_TEMP\Icon5.ico aa34574d2b2f3e48aa0fde2a8357c575.exe File created C:\Windows\SHARE_TEMP\Icon6.ico aa34574d2b2f3e48aa0fde2a8357c575.exe File created C:\Windows\SHARE_TEMP\Icon7.ico aa34574d2b2f3e48aa0fde2a8357c575.exe File created C:\Windows\SHARE_TEMP\Icon12.ico aa34574d2b2f3e48aa0fde2a8357c575.exe File created C:\Windows\bugMAKER.bat aa34574d2b2f3e48aa0fde2a8357c575.exe File opened for modification C:\Windows\winhash_up.exez aa34574d2b2f3e48aa0fde2a8357c575.exe File created C:\Windows\winhash_up.exe aa34574d2b2f3e48aa0fde2a8357c575.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4728 cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3076 wrote to memory of 4728 3076 aa34574d2b2f3e48aa0fde2a8357c575.exe 86 PID 3076 wrote to memory of 4728 3076 aa34574d2b2f3e48aa0fde2a8357c575.exe 86 PID 3076 wrote to memory of 4728 3076 aa34574d2b2f3e48aa0fde2a8357c575.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa34574d2b2f3e48aa0fde2a8357c575.exe"C:\Users\Admin\AppData\Local\Temp\aa34574d2b2f3e48aa0fde2a8357c575.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:4728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD57a43061872866a782b04900c3387d906
SHA19c898288f4b8b63b8ccb9636283d09cf116d738f
SHA25678caf7b3bf065f9c27542d22fc57409becc3788f06522a38761c9a6380658c7c
SHA512f349932aca5e5dfd1556cc62e50e2898b57d9749d74910cbfe916798d7a4b237dcca6fc232a11041d0189732f707804634e565ca7a9b08ff863c10f6ca1a044c