Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-03-2024 03:33

General

  • Target

    78cd34258d135b3a8f62ddfa75f1b3d9617469c07bed6cd31c716b2210186860.exe

  • Size

    197KB

  • MD5

    11186b8579ddb7e5132a8957d4b07da9

  • SHA1

    ce88bc8c3815e44a560f50538b6cc9fe131156b3

  • SHA256

    78cd34258d135b3a8f62ddfa75f1b3d9617469c07bed6cd31c716b2210186860

  • SHA512

    585366f20ee2b57494ef35968f875ab152e91ca7b5cefbc64e0135599a21c8d9e1f8de1cab9c33e573b83fa799990e734973b56c866992d92bc6cf529a420589

  • SSDEEP

    6144:rBs27MMLyX5HXXXDTXXXOGqIII+pXXX5AYjKXXXDoXXXG6XXXxXXXLIIIEAkOCOd:rK20HXXX/XXXFqIIIcXXX5j2XXXcXXXY

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\78cd34258d135b3a8f62ddfa75f1b3d9617469c07bed6cd31c716b2210186860.exe
    "C:\Users\Admin\AppData\Local\Temp\78cd34258d135b3a8f62ddfa75f1b3d9617469c07bed6cd31c716b2210186860.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\78CD34~1.EXE > nul
      2⤵
        PID:3536
    • C:\Windows\Debug\uyghost.exe
      C:\Windows\Debug\uyghost.exe
      1⤵
      • Executes dropped EXE
      • Checks processor information in registry
      PID:3016

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\debug\uyghost.exe

      Filesize

      197KB

      MD5

      ecc5d325af008a819b35c06582ffabbf

      SHA1

      6679c47c3a75fa466e550e71312846d5315e6550

      SHA256

      c309486895d93674baef6777b336475141264384d50fe52498a5d53aa0ed970e

      SHA512

      a9149ea120ba3b12c1c7e75a4ea2ec89c6d775a206e009cc61db7ccab9eb15a9fddaa9a1d45e8fc58a950e4534683f4016e35755ba11ed7786cadbb9977ccd85