Analysis
-
max time kernel
182s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2023, 04:06
Static task
static1
Behavioral task
behavioral1
Sample
0e11551b88a4127a0e94f06baac5cdb39fc32eb5371d152ff14544e0255784e4.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0e11551b88a4127a0e94f06baac5cdb39fc32eb5371d152ff14544e0255784e4.exe
Resource
win10v2004-20230915-en
General
-
Target
0e11551b88a4127a0e94f06baac5cdb39fc32eb5371d152ff14544e0255784e4.exe
-
Size
1.2MB
-
MD5
ea2e718051683be0d423ae5a1e785fa4
-
SHA1
d9951f94dad51aaaa599460b80758809a4412a60
-
SHA256
0e11551b88a4127a0e94f06baac5cdb39fc32eb5371d152ff14544e0255784e4
-
SHA512
818446b9b3c1dd697f41ee968d3ba0a8600109853f3f0cd1c3ecdef0acdfff5b193dbb02b87c5e0b6f3af7cd2e834c1e957cc6860337c9bbd2c71aa7bc45f639
-
SSDEEP
24576:GHXXX/XXXFqIIIcXXX5j2XXXcXXXfXXXxXXXLIII+Ph2kkkkK4kXkkkkkkkkhLXJ:G9qIIIUjfIIIAbazR0vKLXZc
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation 0e11551b88a4127a0e94f06baac5cdb39fc32eb5371d152ff14544e0255784e4.exe -
Executes dropped EXE 1 IoCs
pid Process 2276 eiyhost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Debug\eiyhost.exe 0e11551b88a4127a0e94f06baac5cdb39fc32eb5371d152ff14544e0255784e4.exe File opened for modification C:\Windows\Debug\eiyhost.exe 0e11551b88a4127a0e94f06baac5cdb39fc32eb5371d152ff14544e0255784e4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 eiyhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz eiyhost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4372 0e11551b88a4127a0e94f06baac5cdb39fc32eb5371d152ff14544e0255784e4.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4372 wrote to memory of 2648 4372 0e11551b88a4127a0e94f06baac5cdb39fc32eb5371d152ff14544e0255784e4.exe 88 PID 4372 wrote to memory of 2648 4372 0e11551b88a4127a0e94f06baac5cdb39fc32eb5371d152ff14544e0255784e4.exe 88 PID 4372 wrote to memory of 2648 4372 0e11551b88a4127a0e94f06baac5cdb39fc32eb5371d152ff14544e0255784e4.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e11551b88a4127a0e94f06baac5cdb39fc32eb5371d152ff14544e0255784e4.exe"C:\Users\Admin\AppData\Local\Temp\0e11551b88a4127a0e94f06baac5cdb39fc32eb5371d152ff14544e0255784e4.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\0E1155~1.EXE > nul2⤵PID:2648
-
-
C:\Windows\Debug\eiyhost.exeC:\Windows\Debug\eiyhost.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
PID:2276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD54d6196e51cbb03833e5c68cf0220d3e4
SHA1b9666d71c412b9d5326db698cdfa54d46299cea4
SHA256cadbca34d1c46c6222274ef694010bba9f2bf82cb994f91092274044014782cf
SHA512905320128a62fe3add0715243edf4295733f8a7d02aa7341e9c5b350d09b30b54e3091f97359d29629d005fd8fe22652827251636c765c30f898c49622099bcc
-
Filesize
1.2MB
MD54d6196e51cbb03833e5c68cf0220d3e4
SHA1b9666d71c412b9d5326db698cdfa54d46299cea4
SHA256cadbca34d1c46c6222274ef694010bba9f2bf82cb994f91092274044014782cf
SHA512905320128a62fe3add0715243edf4295733f8a7d02aa7341e9c5b350d09b30b54e3091f97359d29629d005fd8fe22652827251636c765c30f898c49622099bcc