Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 08:23
Static task
static1
Behavioral task
behavioral1
Sample
caef20dc44a9502c2a50db1d573ed501.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
caef20dc44a9502c2a50db1d573ed501.exe
Resource
win10v2004-20240226-en
General
-
Target
caef20dc44a9502c2a50db1d573ed501.exe
-
Size
44KB
-
MD5
caef20dc44a9502c2a50db1d573ed501
-
SHA1
78193abcafa07aacbfd409859ff99373c6914c4a
-
SHA256
3ba2bdcaf5a02f2f6282e25db3d247e958c6719b4e4b424ab73ebf51e618e752
-
SHA512
2666d4a54fc7948226261cb4d07ad4e66b7650f04643d9b2c6b7e8fc2cbe159f69873e696ea92207e9f6f9e84530260b9bf3843194b33e8fe45abd8ce46080fd
-
SSDEEP
768:GF0DJDwv3mR/HTkXoZOlDWkPaFE9+e4UPqFbzOhvHT75UPgSBfCv:GyDRwi7kXo2Ra+YHsqS3KYSBfCv
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\explorer\run ishost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\ishost.exe = "ishost.exe" ishost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation caef20dc44a9502c2a50db1d573ed501.exe -
Executes dropped EXE 2 IoCs
pid Process 3076 ishost.exe 4764 ismon.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\ishost.exe caef20dc44a9502c2a50db1d573ed501.exe File opened for modification C:\Windows\SysWOW64\ishost.exe caef20dc44a9502c2a50db1d573ed501.exe File created C:\Windows\SysWOW64\ismon.exe ishost.exe File created C:\Windows\SysWOW64\components\flx0.dll ishost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4152 caef20dc44a9502c2a50db1d573ed501.exe 4152 caef20dc44a9502c2a50db1d573ed501.exe 3076 ishost.exe 3076 ishost.exe 3076 ishost.exe 3076 ishost.exe 4764 ismon.exe 4764 ismon.exe 3076 ishost.exe 3076 ishost.exe 4764 ismon.exe 4764 ismon.exe 3076 ishost.exe 3076 ishost.exe 4764 ismon.exe 4764 ismon.exe 3076 ishost.exe 3076 ishost.exe 4764 ismon.exe 4764 ismon.exe 3076 ishost.exe 3076 ishost.exe 4764 ismon.exe 4764 ismon.exe 3076 ishost.exe 3076 ishost.exe 4764 ismon.exe 4764 ismon.exe 3076 ishost.exe 3076 ishost.exe 4764 ismon.exe 4764 ismon.exe 3076 ishost.exe 3076 ishost.exe 4764 ismon.exe 4764 ismon.exe 3076 ishost.exe 3076 ishost.exe 4764 ismon.exe 4764 ismon.exe 3076 ishost.exe 3076 ishost.exe 4764 ismon.exe 4764 ismon.exe 3076 ishost.exe 3076 ishost.exe 4764 ismon.exe 4764 ismon.exe 3076 ishost.exe 3076 ishost.exe 4764 ismon.exe 4764 ismon.exe 3076 ishost.exe 3076 ishost.exe 4764 ismon.exe 4764 ismon.exe 3076 ishost.exe 3076 ishost.exe 4764 ismon.exe 4764 ismon.exe 3076 ishost.exe 3076 ishost.exe 4764 ismon.exe 4764 ismon.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4152 caef20dc44a9502c2a50db1d573ed501.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4152 wrote to memory of 3076 4152 caef20dc44a9502c2a50db1d573ed501.exe 88 PID 4152 wrote to memory of 3076 4152 caef20dc44a9502c2a50db1d573ed501.exe 88 PID 4152 wrote to memory of 3076 4152 caef20dc44a9502c2a50db1d573ed501.exe 88 PID 3076 wrote to memory of 4764 3076 ishost.exe 89 PID 3076 wrote to memory of 4764 3076 ishost.exe 89 PID 3076 wrote to memory of 4764 3076 ishost.exe 89 PID 4152 wrote to memory of 1476 4152 caef20dc44a9502c2a50db1d573ed501.exe 90 PID 4152 wrote to memory of 1476 4152 caef20dc44a9502c2a50db1d573ed501.exe 90 PID 4152 wrote to memory of 1476 4152 caef20dc44a9502c2a50db1d573ed501.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\caef20dc44a9502c2a50db1d573ed501.exe"C:\Users\Admin\AppData\Local\Temp\caef20dc44a9502c2a50db1d573ed501.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\SysWOW64\ishost.exeC:\Windows\system32\ishost.exe2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\ismon.exeC:\Windows\system32\ismon.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4764
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\CAEF20~1.EXE > nul2⤵PID:1476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD57e9830d931fc68f6a58ec535a308c148
SHA1b16e35e28264e5ed11bec85c2c7a39e768105de9
SHA2567b7e6a4562c37b7cf02a95a94c69ac467166df7c5cae9709bcd89c8ac28c6782
SHA5125ce8cb7a904db9d25b5a66c804c4248aaf5e2430d3270d623f33a813af389aab5e69297970a4c45f0542db372a7a3c629d8d3337d4539b92babb01b73fb429dd
-
Filesize
5KB
MD5c96468d9e0a7954f9614470ae0df8331
SHA1478650185a342538e8c00061c7cbd6fcf46a64b8
SHA256b3ab243c9dac91be82605bf2ba7b9c41c2a5af9bb82ced14b444314575e706bb
SHA51289591244e83a821fbaa796288543720652314def792a6acbbd5e836621b16ad0777f489037e729f9feeba3cb5a23fd7169e5d0a2b8d162edc27dd9e8c5d13c79