Analysis
-
max time kernel
92s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 17:40
Static task
static1
Behavioral task
behavioral1
Sample
ac777bfd1b6806938a7727ab61f96259.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ac777bfd1b6806938a7727ab61f96259.exe
Resource
win10v2004-20240226-en
General
-
Target
ac777bfd1b6806938a7727ab61f96259.exe
-
Size
241KB
-
MD5
ac777bfd1b6806938a7727ab61f96259
-
SHA1
32160ad90d85399608d5a62e3f1f6a7f32e47de6
-
SHA256
2bfb8746afb896b7cff3d2071a7942b3e4cded0e39c23a97ead5c7c0f9c9471e
-
SHA512
ce89bb30360c5343326a093b2e5d4b039b8129b07aa9abdce61fc32fd9f5659ff2c5072b2f4ea797a352fa4f217162d27a7e61dc0637d13f78b044c66e06a928
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8ykgnYHfQlAM:o68i3odBiTl2+TCU/Uk8KfQl9k87
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" ac777bfd1b6806938a7727ab61f96259.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon10.ico ac777bfd1b6806938a7727ab61f96259.exe File created C:\Windows\winhash_up.exez ac777bfd1b6806938a7727ab61f96259.exe File created C:\Windows\SHARE_TEMP\Icon5.ico ac777bfd1b6806938a7727ab61f96259.exe File created C:\Windows\SHARE_TEMP\Icon6.ico ac777bfd1b6806938a7727ab61f96259.exe File created C:\Windows\SHARE_TEMP\Icon7.ico ac777bfd1b6806938a7727ab61f96259.exe File created C:\Windows\SHARE_TEMP\Icon12.ico ac777bfd1b6806938a7727ab61f96259.exe File created C:\Windows\SHARE_TEMP\Icon14.ico ac777bfd1b6806938a7727ab61f96259.exe File created C:\Windows\bugMAKER.bat ac777bfd1b6806938a7727ab61f96259.exe File opened for modification C:\Windows\winhash_up.exez ac777bfd1b6806938a7727ab61f96259.exe File created C:\Windows\winhash_up.exe ac777bfd1b6806938a7727ab61f96259.exe File created C:\Windows\SHARE_TEMP\Icon2.ico ac777bfd1b6806938a7727ab61f96259.exe File created C:\Windows\SHARE_TEMP\Icon3.ico ac777bfd1b6806938a7727ab61f96259.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1600 cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 464 wrote to memory of 1600 464 ac777bfd1b6806938a7727ab61f96259.exe 86 PID 464 wrote to memory of 1600 464 ac777bfd1b6806938a7727ab61f96259.exe 86 PID 464 wrote to memory of 1600 464 ac777bfd1b6806938a7727ab61f96259.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac777bfd1b6806938a7727ab61f96259.exe"C:\Users\Admin\AppData\Local\Temp\ac777bfd1b6806938a7727ab61f96259.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:1600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD56aa0956420bbbacff62ff3a0e8fa6d83
SHA11d5b812b9293b7c40402c3482784e2fe1571a7c8
SHA256d158b6ccfd11e42a70af31fc86648c1427c471df195cec0a93d2f387cf08e152
SHA51216dd974c06a2d9b87bbdcf6ceb644cbbef7769accb61465c45c7c2f740c9b4a12322f202a47466ee89c9f44f34888b3b7f41f7c7736c477d2791997855b746af