Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2024, 05:32
Static task
static1
Behavioral task
behavioral1
Sample
114b4be2cd605b397bdd5a1001732de606a570e7e415f578448348774e4e1894.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
114b4be2cd605b397bdd5a1001732de606a570e7e415f578448348774e4e1894.exe
Resource
win10v2004-20240221-en
General
-
Target
114b4be2cd605b397bdd5a1001732de606a570e7e415f578448348774e4e1894.exe
-
Size
197KB
-
MD5
9b6136646dd3ef926c506bde16c53b16
-
SHA1
82b1df148283e5142178d0e80c7411a787154183
-
SHA256
114b4be2cd605b397bdd5a1001732de606a570e7e415f578448348774e4e1894
-
SHA512
9a601a29ce73278a60594702411137f2872acebfccd3c37dff4a1b7cafa08e3572f1108b8056f25cca84311876f1c31bf1c18dcc0ac4573607ca0f86ca4e3351
-
SSDEEP
6144:rBs27MMLyX5HXXXDTXXXOGqIII+pXXX5AYjKXXXDoXXXG6XXXxXXXLIIIEAkOCO6:rK20HXXX/XXXFqIIIcXXX5j2XXXcXXXD
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3538781373-1545967067-4263767959-1000\Control Panel\International\Geo\Nation 114b4be2cd605b397bdd5a1001732de606a570e7e415f578448348774e4e1894.exe -
Executes dropped EXE 1 IoCs
pid Process 1512 zewhost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Debug\zewhost.exe 114b4be2cd605b397bdd5a1001732de606a570e7e415f578448348774e4e1894.exe File opened for modification C:\Windows\Debug\zewhost.exe 114b4be2cd605b397bdd5a1001732de606a570e7e415f578448348774e4e1894.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 zewhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz zewhost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4864 114b4be2cd605b397bdd5a1001732de606a570e7e415f578448348774e4e1894.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4864 wrote to memory of 2608 4864 114b4be2cd605b397bdd5a1001732de606a570e7e415f578448348774e4e1894.exe 91 PID 4864 wrote to memory of 2608 4864 114b4be2cd605b397bdd5a1001732de606a570e7e415f578448348774e4e1894.exe 91 PID 4864 wrote to memory of 2608 4864 114b4be2cd605b397bdd5a1001732de606a570e7e415f578448348774e4e1894.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\114b4be2cd605b397bdd5a1001732de606a570e7e415f578448348774e4e1894.exe"C:\Users\Admin\AppData\Local\Temp\114b4be2cd605b397bdd5a1001732de606a570e7e415f578448348774e4e1894.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\114B4B~1.EXE > nul2⤵PID:2608
-
-
C:\Windows\Debug\zewhost.exeC:\Windows\Debug\zewhost.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
PID:1512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197KB
MD5fc8341e0df40750a27a90c662bb92efd
SHA1d80aa323245679df1fa3c6afff70527c7063389f
SHA25631b5810f70fdfacb2f4f3339d8eb6ddaa5620dc3210e8a0d7f44ef047b872155
SHA512f8fc1ff8ddcd1d52408b67fed13097c806b10d37da4a0df702858b34fcd54a303efda31ba794bb812b64afef835b3d426f9175356764864642b66e486cb4d1ec