Analysis
-
max time kernel
141s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 04:45
Static task
static1
Behavioral task
behavioral1
Sample
a270dc3271a28e2cda736feaad5f2df9d0cd036be12d1600d4d246e6bd737a39.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a270dc3271a28e2cda736feaad5f2df9d0cd036be12d1600d4d246e6bd737a39.exe
Resource
win10v2004-20230915-en
General
-
Target
a270dc3271a28e2cda736feaad5f2df9d0cd036be12d1600d4d246e6bd737a39.exe
-
Size
198KB
-
MD5
d597ff2a4e5f1b55f5dc643f3123f355
-
SHA1
25cf20d0a2dc8a3ccb2441a7d99307564a90b9b1
-
SHA256
a270dc3271a28e2cda736feaad5f2df9d0cd036be12d1600d4d246e6bd737a39
-
SHA512
007fffc0a85a31331766a09917e98f51b01bb02c40109c577ff545a1c1cf3a8e900b4a781ce503287fc83872a97696fae54abaa2dc646f1a21e77639e9915f1f
-
SSDEEP
6144:rBs27MMLyX5HXXXDTXXXOGqIII+pXXX5AYjKXXXDoXXXG6XXXxXXXLIIIEAkOCO6:rK20HXXX/XXXFqIIIcXXX5j2XXXcXXX7
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2080 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2448 ayahost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Debug\ayahost.exe a270dc3271a28e2cda736feaad5f2df9d0cd036be12d1600d4d246e6bd737a39.exe File opened for modification C:\Windows\Debug\ayahost.exe a270dc3271a28e2cda736feaad5f2df9d0cd036be12d1600d4d246e6bd737a39.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ayahost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ayahost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2224 a270dc3271a28e2cda736feaad5f2df9d0cd036be12d1600d4d246e6bd737a39.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2080 2224 a270dc3271a28e2cda736feaad5f2df9d0cd036be12d1600d4d246e6bd737a39.exe 29 PID 2224 wrote to memory of 2080 2224 a270dc3271a28e2cda736feaad5f2df9d0cd036be12d1600d4d246e6bd737a39.exe 29 PID 2224 wrote to memory of 2080 2224 a270dc3271a28e2cda736feaad5f2df9d0cd036be12d1600d4d246e6bd737a39.exe 29 PID 2224 wrote to memory of 2080 2224 a270dc3271a28e2cda736feaad5f2df9d0cd036be12d1600d4d246e6bd737a39.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\a270dc3271a28e2cda736feaad5f2df9d0cd036be12d1600d4d246e6bd737a39.exe"C:\Users\Admin\AppData\Local\Temp\a270dc3271a28e2cda736feaad5f2df9d0cd036be12d1600d4d246e6bd737a39.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\A270DC~1.EXE > nul2⤵
- Deletes itself
PID:2080
-
-
C:\Windows\Debug\ayahost.exeC:\Windows\Debug\ayahost.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
PID:2448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198KB
MD58d7d2289e6011bcf693d1ff16fb7538f
SHA1cea96c0e625efc92ac81dc5ac3361f6a1df6b96f
SHA256ed174047d21ded29c75a74e9a028ed5d49466159db450c8e37babf4245bff4b7
SHA5125fbc0f229b50f761d64fcdf8b52550c554af343cb98bfcbe6fd26effd0fd19c97e2ba5cbb5f4516a869f61a9b5eacbf738b905b5160d36b9bb8139cff42a084d