Analysis
-
max time kernel
141s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 21:03
Static task
static1
Behavioral task
behavioral1
Sample
426202052d36fdafe0e73df31ef444ee97c5d1c3ee526bac25ffc1feb6b3994c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
426202052d36fdafe0e73df31ef444ee97c5d1c3ee526bac25ffc1feb6b3994c.exe
Resource
win10v2004-20240226-en
General
-
Target
426202052d36fdafe0e73df31ef444ee97c5d1c3ee526bac25ffc1feb6b3994c.exe
-
Size
375KB
-
MD5
ee62c993bd0f6de161fffd0a7e25c38a
-
SHA1
ade91bd2a1b6695b147073f62dc2d307e98ea784
-
SHA256
426202052d36fdafe0e73df31ef444ee97c5d1c3ee526bac25ffc1feb6b3994c
-
SHA512
27aac25f53527121faef41051ac038e3c38d6c3d4e37a942e9ea455e69c1ea300c379bb53dff2b24ab031fa96ba1d962e6bb8f7d05553dd187950233fee88a3d
-
SSDEEP
6144:/Bs27GluLyXxQQIIIhg6XXXDzXXX13s2III/TAXXXmlXXXLIIIG/ru5Yg/18ddvS:/K2+yQIII1XXX/XXX62III/UXXXmlXXg
Malware Config
Signatures
-
Detects Windows executables referencing non-Windows User-Agents 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023209-2.dat INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation 426202052d36fdafe0e73df31ef444ee97c5d1c3ee526bac25ffc1feb6b3994c.exe -
Executes dropped EXE 1 IoCs
pid Process 2968 egkhost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Debug\egkhost.exe 426202052d36fdafe0e73df31ef444ee97c5d1c3ee526bac25ffc1feb6b3994c.exe File opened for modification C:\Windows\Debug\egkhost.exe 426202052d36fdafe0e73df31ef444ee97c5d1c3ee526bac25ffc1feb6b3994c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 egkhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz egkhost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2468 426202052d36fdafe0e73df31ef444ee97c5d1c3ee526bac25ffc1feb6b3994c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2832 2468 426202052d36fdafe0e73df31ef444ee97c5d1c3ee526bac25ffc1feb6b3994c.exe 87 PID 2468 wrote to memory of 2832 2468 426202052d36fdafe0e73df31ef444ee97c5d1c3ee526bac25ffc1feb6b3994c.exe 87 PID 2468 wrote to memory of 2832 2468 426202052d36fdafe0e73df31ef444ee97c5d1c3ee526bac25ffc1feb6b3994c.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\426202052d36fdafe0e73df31ef444ee97c5d1c3ee526bac25ffc1feb6b3994c.exe"C:\Users\Admin\AppData\Local\Temp\426202052d36fdafe0e73df31ef444ee97c5d1c3ee526bac25ffc1feb6b3994c.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\426202~1.EXE > nul2⤵PID:2832
-
-
C:\Windows\Debug\egkhost.exeC:\Windows\Debug\egkhost.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
PID:2968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
375KB
MD5a7ef9241f09e4ea1fe1e585de3a8fb21
SHA127d7658b663b4a3d0a2f66d3c554d3497eb09b9b
SHA25691ca9d3a204d89551c00884d1313278c38ad44e0b84abc48fdcbe710626d377b
SHA51278d63453f210e2f4633aeb24dca20bcc03c2895da4f79cefc239282f2e5d321fb6618e79ada4ae1e6b223ed1e551e092e06166b5ebbf3f724c5e3b5dddf70cc3