Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/01/2024, 12:39
Static task
static1
Behavioral task
behavioral1
Sample
bb73bbe07d46d3966584fd13599bbc223a31dd04a38a310065ae025654a6e2cb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
bb73bbe07d46d3966584fd13599bbc223a31dd04a38a310065ae025654a6e2cb.exe
Resource
win10v2004-20231222-en
General
-
Target
bb73bbe07d46d3966584fd13599bbc223a31dd04a38a310065ae025654a6e2cb.exe
-
Size
195KB
-
MD5
3a48624e7f8e0969a04274a823284384
-
SHA1
e9028bf56516ecf397bc346a7791c082d229197e
-
SHA256
bb73bbe07d46d3966584fd13599bbc223a31dd04a38a310065ae025654a6e2cb
-
SHA512
4750125eafc76015b7e3d37d62032aa99c4326da423508e1556fa4aa406ca1dcf3659ef215f711c3511ca75b5d1a5e0b68c3e806d30b42c5b93fd3ae4621892a
-
SSDEEP
6144:rBs27MMLyX5HXXXDTXXXOGqIII+pXXX5AYjKXXXDoXXXG6XXXxXXXLIIIEAkOCOQ:rK20HXXX/XXXFqIIIcXXX5j2XXXcXXXJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1800 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2408 iuyhost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Debug\iuyhost.exe bb73bbe07d46d3966584fd13599bbc223a31dd04a38a310065ae025654a6e2cb.exe File opened for modification C:\Windows\Debug\iuyhost.exe bb73bbe07d46d3966584fd13599bbc223a31dd04a38a310065ae025654a6e2cb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 iuyhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz iuyhost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1568 bb73bbe07d46d3966584fd13599bbc223a31dd04a38a310065ae025654a6e2cb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1568 wrote to memory of 1800 1568 bb73bbe07d46d3966584fd13599bbc223a31dd04a38a310065ae025654a6e2cb.exe 29 PID 1568 wrote to memory of 1800 1568 bb73bbe07d46d3966584fd13599bbc223a31dd04a38a310065ae025654a6e2cb.exe 29 PID 1568 wrote to memory of 1800 1568 bb73bbe07d46d3966584fd13599bbc223a31dd04a38a310065ae025654a6e2cb.exe 29 PID 1568 wrote to memory of 1800 1568 bb73bbe07d46d3966584fd13599bbc223a31dd04a38a310065ae025654a6e2cb.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb73bbe07d46d3966584fd13599bbc223a31dd04a38a310065ae025654a6e2cb.exe"C:\Users\Admin\AppData\Local\Temp\bb73bbe07d46d3966584fd13599bbc223a31dd04a38a310065ae025654a6e2cb.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\BB73BB~1.EXE > nul2⤵
- Deletes itself
PID:1800
-
-
C:\Windows\Debug\iuyhost.exeC:\Windows\Debug\iuyhost.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
PID:2408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
195KB
MD51ebb1fd8098a923076711037a2f6eba9
SHA1cfa60e858af3df9d8796bc2153097867f873700f
SHA2568118e890fc5411d9a765cc2169d40695dd48826dff80030977081f1d85c39f02
SHA5127f77ec5a22a99b96639eb57d118aaabf03a8736e96912c3a2f463592c70a4e3c5c9b5787d79d5aaf9a1c5c5736778166d49bd2648d0c53c5ef67cba271743ddc