Analysis
-
max time kernel
146s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
12-11-2023 09:49
Static task
static1
Behavioral task
behavioral1
Sample
c6a7a20eefb9dbc5b09eddf69411251ef125b5d84e55ef665034bdf860b63146.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
c6a7a20eefb9dbc5b09eddf69411251ef125b5d84e55ef665034bdf860b63146.exe
Resource
win10v2004-20231025-en
General
-
Target
c6a7a20eefb9dbc5b09eddf69411251ef125b5d84e55ef665034bdf860b63146.exe
-
Size
1.2MB
-
MD5
e78ecd81a0033f2f4db0d8c764a02dfb
-
SHA1
0fe18c77cc0a4707fc8eab7292f8a6813df570c4
-
SHA256
c6a7a20eefb9dbc5b09eddf69411251ef125b5d84e55ef665034bdf860b63146
-
SHA512
0c6f61d61cea1015552c05231ac7376a85fd5332d35d875f74ce473dff66d5a4e5370adb7c2556ab921432a9714a1df9214d773e549fed7c23a75b7177e74e7d
-
SSDEEP
24576:GHXXX/XXXFqIIIcXXX5j2XXXcXXXfXXXxXXXLIII+Ph2kkkkK4kXkkkkkkkkhLXG:G9qIIIUjfIIIAbazR0vKLXZj
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation c6a7a20eefb9dbc5b09eddf69411251ef125b5d84e55ef665034bdf860b63146.exe -
Executes dropped EXE 1 IoCs
pid Process 4328 guehost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Debug\guehost.exe c6a7a20eefb9dbc5b09eddf69411251ef125b5d84e55ef665034bdf860b63146.exe File opened for modification C:\Windows\Debug\guehost.exe c6a7a20eefb9dbc5b09eddf69411251ef125b5d84e55ef665034bdf860b63146.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz guehost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 guehost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3784 c6a7a20eefb9dbc5b09eddf69411251ef125b5d84e55ef665034bdf860b63146.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3784 wrote to memory of 1628 3784 c6a7a20eefb9dbc5b09eddf69411251ef125b5d84e55ef665034bdf860b63146.exe 90 PID 3784 wrote to memory of 1628 3784 c6a7a20eefb9dbc5b09eddf69411251ef125b5d84e55ef665034bdf860b63146.exe 90 PID 3784 wrote to memory of 1628 3784 c6a7a20eefb9dbc5b09eddf69411251ef125b5d84e55ef665034bdf860b63146.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6a7a20eefb9dbc5b09eddf69411251ef125b5d84e55ef665034bdf860b63146.exe"C:\Users\Admin\AppData\Local\Temp\c6a7a20eefb9dbc5b09eddf69411251ef125b5d84e55ef665034bdf860b63146.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\C6A7A2~1.EXE > nul2⤵PID:1628
-
-
C:\Windows\Debug\guehost.exeC:\Windows\Debug\guehost.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
PID:4328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD535373db67ddd74d76c0f17c8a5bcf305
SHA137e985ecb1044dc0c6b8492d598ed7b0602795fa
SHA2564fbc62e18c643eb4de30a38522c4671a7ae3383fb6b224c260fd4760b4bb9bed
SHA5128cecf3cafdfe42dc908091fefb5bbbe96611090a547783eae0f056592c711e62bdf496f151fb797de4e169a10c22386f1feb0e192208d84e98636534aaf52459
-
Filesize
1.2MB
MD535373db67ddd74d76c0f17c8a5bcf305
SHA137e985ecb1044dc0c6b8492d598ed7b0602795fa
SHA2564fbc62e18c643eb4de30a38522c4671a7ae3383fb6b224c260fd4760b4bb9bed
SHA5128cecf3cafdfe42dc908091fefb5bbbe96611090a547783eae0f056592c711e62bdf496f151fb797de4e169a10c22386f1feb0e192208d84e98636534aaf52459