Analysis
-
max time kernel
140s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/01/2024, 15:41
Behavioral task
behavioral1
Sample
bca2dcc6f1aa83bd763c8a423c7ad268.exe
Resource
win7-20231215-en
9 signatures
150 seconds
General
-
Target
bca2dcc6f1aa83bd763c8a423c7ad268.exe
-
Size
156KB
-
MD5
bca2dcc6f1aa83bd763c8a423c7ad268
-
SHA1
d46debc4e02485cf31c407f5fbf89185216e439b
-
SHA256
60da0200f3a3ed4c5328f6c6488bb8868c2e228fbd99bd1ea9fa5c3761170c19
-
SHA512
e0a91a4691dd2700044ff5f7e3efdbd042e30d48ff1bd51a66642da349cc763bd811d549e01d9c218c4ac3e8d6002b6122ba140c0b2485d2219c1e4ade21698e
-
SSDEEP
384:+BdCJAKQDuuOFZyUVpULCgDb2prxVTw24I+6Al6zKyXKKDglgTlkgUH/a4QR:MdCyTDcZyUpULCgodM96eyX5OfVm
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2112 attrib.exe -
Deletes itself 1 IoCs
pid Process 2060 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3000 ayahost.exe -
resource yara_rule behavioral1/memory/3000-5-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1696-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/3000-6-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Debug\ayahost.exe bca2dcc6f1aa83bd763c8a423c7ad268.exe File opened for modification C:\Windows\Debug\ayahost.exe bca2dcc6f1aa83bd763c8a423c7ad268.exe File opened for modification C:\Windows\Debug\ayahost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1696 bca2dcc6f1aa83bd763c8a423c7ad268.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2112 1696 bca2dcc6f1aa83bd763c8a423c7ad268.exe 16 PID 1696 wrote to memory of 2112 1696 bca2dcc6f1aa83bd763c8a423c7ad268.exe 16 PID 1696 wrote to memory of 2112 1696 bca2dcc6f1aa83bd763c8a423c7ad268.exe 16 PID 1696 wrote to memory of 2112 1696 bca2dcc6f1aa83bd763c8a423c7ad268.exe 16 PID 1696 wrote to memory of 2060 1696 bca2dcc6f1aa83bd763c8a423c7ad268.exe 21 PID 1696 wrote to memory of 2060 1696 bca2dcc6f1aa83bd763c8a423c7ad268.exe 21 PID 1696 wrote to memory of 2060 1696 bca2dcc6f1aa83bd763c8a423c7ad268.exe 21 PID 1696 wrote to memory of 2060 1696 bca2dcc6f1aa83bd763c8a423c7ad268.exe 21 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2112 attrib.exe
Processes
-
C:\Windows\Debug\ayahost.exeC:\Windows\Debug\ayahost.exe1⤵
- Executes dropped EXE
PID:3000
-
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\ayahost.exe1⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:2112
-
C:\Users\Admin\AppData\Local\Temp\bca2dcc6f1aa83bd763c8a423c7ad268.exe"C:\Users\Admin\AppData\Local\Temp\bca2dcc6f1aa83bd763c8a423c7ad268.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\BCA2DC~1.EXE > nul2⤵
- Deletes itself
PID:2060
-