Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 19:29
Static task
static1
Behavioral task
behavioral1
Sample
1bf3494235405e145fd0d0b2707ad284ad2862052a2ece49acfec1b0eae22598.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1bf3494235405e145fd0d0b2707ad284ad2862052a2ece49acfec1b0eae22598.exe
Resource
win10v2004-20240412-en
General
-
Target
1bf3494235405e145fd0d0b2707ad284ad2862052a2ece49acfec1b0eae22598.exe
-
Size
175KB
-
MD5
22f72f91e5971063cdf76884e5af7f6f
-
SHA1
3aabe2fadd4121234a95e64bf82223b6293001d0
-
SHA256
1bf3494235405e145fd0d0b2707ad284ad2862052a2ece49acfec1b0eae22598
-
SHA512
3c3eecdcb86d04550fceec6ad5535e83f03b131783fce54e056e4806243e824b798056467f82e14cdaff1ba60dde70c363500973f39c977bc33610c4fe1dc512
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8ZtkaH:o68i3odBiTl2+TCU/DtkE
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 1bf3494235405e145fd0d0b2707ad284ad2862052a2ece49acfec1b0eae22598.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon3.ico 1bf3494235405e145fd0d0b2707ad284ad2862052a2ece49acfec1b0eae22598.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 1bf3494235405e145fd0d0b2707ad284ad2862052a2ece49acfec1b0eae22598.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 1bf3494235405e145fd0d0b2707ad284ad2862052a2ece49acfec1b0eae22598.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 1bf3494235405e145fd0d0b2707ad284ad2862052a2ece49acfec1b0eae22598.exe File created C:\Windows\bugMAKER.bat 1bf3494235405e145fd0d0b2707ad284ad2862052a2ece49acfec1b0eae22598.exe File created C:\Windows\winhash_up.exez 1bf3494235405e145fd0d0b2707ad284ad2862052a2ece49acfec1b0eae22598.exe File opened for modification C:\Windows\winhash_up.exez 1bf3494235405e145fd0d0b2707ad284ad2862052a2ece49acfec1b0eae22598.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 1bf3494235405e145fd0d0b2707ad284ad2862052a2ece49acfec1b0eae22598.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 1bf3494235405e145fd0d0b2707ad284ad2862052a2ece49acfec1b0eae22598.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 1bf3494235405e145fd0d0b2707ad284ad2862052a2ece49acfec1b0eae22598.exe File created C:\Windows\winhash_up.exe 1bf3494235405e145fd0d0b2707ad284ad2862052a2ece49acfec1b0eae22598.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 1bf3494235405e145fd0d0b2707ad284ad2862052a2ece49acfec1b0eae22598.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 728 cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 564 wrote to memory of 728 564 1bf3494235405e145fd0d0b2707ad284ad2862052a2ece49acfec1b0eae22598.exe 84 PID 564 wrote to memory of 728 564 1bf3494235405e145fd0d0b2707ad284ad2862052a2ece49acfec1b0eae22598.exe 84 PID 564 wrote to memory of 728 564 1bf3494235405e145fd0d0b2707ad284ad2862052a2ece49acfec1b0eae22598.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bf3494235405e145fd0d0b2707ad284ad2862052a2ece49acfec1b0eae22598.exe"C:\Users\Admin\AppData\Local\Temp\1bf3494235405e145fd0d0b2707ad284ad2862052a2ece49acfec1b0eae22598.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108B
MD570c2b5970334da758b1d3fffacbd7811
SHA14a3a70c11577f02892b0df612e665dd38d3f7ad5
SHA25686b5d68b47ee8c6c68f10e32566d3183288c16cbe529b9d32fbb7872e10c80da
SHA5123e0c45be7b07bf6d8c5cd2faa980edbccd5bde42d9586f1312c9d6e5e4fea1ebfa550e9a568888a20f57c499a42a21e788f376837fbd0cfdc3e10729b564d836