Analysis
-
max time kernel
144s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-03-2024 02:56
Static task
static1
Behavioral task
behavioral1
Sample
bd7da09835cf8eb7edd2b7e0bee64a58.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
bd7da09835cf8eb7edd2b7e0bee64a58.exe
Resource
win10v2004-20240226-en
General
-
Target
bd7da09835cf8eb7edd2b7e0bee64a58.exe
-
Size
173KB
-
MD5
bd7da09835cf8eb7edd2b7e0bee64a58
-
SHA1
975dbdc5aa13353dbdcb28fdd6b9cee5823ddcea
-
SHA256
2b30c200536c595a8f1f81f914152f50cd50b76484e6dd6e316b16e0634a8bd4
-
SHA512
bc6b773d100ca310a3804fbe5369326b5211e8e02305bc567032d34e956cb88e7e0ae5b52643954feca2262aa7c5ebc8cf0176a239d67c6306185ef6d50cfc8d
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8C:o68i3odBiTl2+TCU/o
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" bd7da09835cf8eb7edd2b7e0bee64a58.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon7.ico bd7da09835cf8eb7edd2b7e0bee64a58.exe File created C:\Windows\SHARE_TEMP\Icon10.ico bd7da09835cf8eb7edd2b7e0bee64a58.exe File created C:\Windows\SHARE_TEMP\Icon12.ico bd7da09835cf8eb7edd2b7e0bee64a58.exe File created C:\Windows\winhash_up.exez bd7da09835cf8eb7edd2b7e0bee64a58.exe File created C:\Windows\winhash_up.exe bd7da09835cf8eb7edd2b7e0bee64a58.exe File created C:\Windows\SHARE_TEMP\Icon5.ico bd7da09835cf8eb7edd2b7e0bee64a58.exe File created C:\Windows\SHARE_TEMP\Icon6.ico bd7da09835cf8eb7edd2b7e0bee64a58.exe File created C:\Windows\bugMAKER.bat bd7da09835cf8eb7edd2b7e0bee64a58.exe File opened for modification C:\Windows\winhash_up.exez bd7da09835cf8eb7edd2b7e0bee64a58.exe File created C:\Windows\SHARE_TEMP\Icon2.ico bd7da09835cf8eb7edd2b7e0bee64a58.exe File created C:\Windows\SHARE_TEMP\Icon3.ico bd7da09835cf8eb7edd2b7e0bee64a58.exe File created C:\Windows\SHARE_TEMP\Icon14.ico bd7da09835cf8eb7edd2b7e0bee64a58.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3412 cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2036 wrote to memory of 3412 2036 bd7da09835cf8eb7edd2b7e0bee64a58.exe 87 PID 2036 wrote to memory of 3412 2036 bd7da09835cf8eb7edd2b7e0bee64a58.exe 87 PID 2036 wrote to memory of 3412 2036 bd7da09835cf8eb7edd2b7e0bee64a58.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd7da09835cf8eb7edd2b7e0bee64a58.exe"C:\Users\Admin\AppData\Local\Temp\bd7da09835cf8eb7edd2b7e0bee64a58.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:3412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD5a991e67909261e890e4043fac1958612
SHA163728c38277d9ee9c9739bff591820052f8e6557
SHA25658be3a85a58bf166b27c2e7607e7add859362529e4bda1338610332bf330a108
SHA512a722f7c0ed0b754abafdff90849343b43e1714f24a048b895ebd62a7f4597c4bfa2687c8a40bbf027874d3688f70d8fba0d25d6842a4b8615086d4ce2a6eacd9