Analysis
-
max time kernel
141s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
29/04/2024, 10:47
Static task
static1
Behavioral task
behavioral1
Sample
4a8bddd108ca8374fbd710cb750c4c5c.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4a8bddd108ca8374fbd710cb750c4c5c.exe
Resource
win10v2004-20240419-en
General
-
Target
4a8bddd108ca8374fbd710cb750c4c5c.exe
-
Size
95KB
-
MD5
4a8bddd108ca8374fbd710cb750c4c5c
-
SHA1
f633b6580d1903eb8f3c5c9bbccc406f7a532c2f
-
SHA256
e1a3b1a7b3f392fcad1c1fd1104e09b64040f5464c8cecd8a0168a4b6056bae6
-
SHA512
e04aab60a8b8ce657967d02e79292b6322b87f63e993940906a3d19d9c3f9897f1139cf0c53c8989495821ccbcab8589ab61bf75e961c332767a8544e0cb3887
-
SSDEEP
1536:lDcfLfIb5Ep1uzgyXVdtnlHNWnnn3CCCCrrDRe6661:lD2LTnuzgyXVd1xIDU6661
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 216 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation 4a8bddd108ca8374fbd710cb750c4c5c.exe -
Executes dropped EXE 1 IoCs
pid Process 464 aiyhost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Debug\aiyhost.exe 4a8bddd108ca8374fbd710cb750c4c5c.exe File opened for modification C:\Windows\Debug\aiyhost.exe 4a8bddd108ca8374fbd710cb750c4c5c.exe File opened for modification C:\Windows\Debug\aiyhost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4420 4a8bddd108ca8374fbd710cb750c4c5c.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4420 wrote to memory of 216 4420 4a8bddd108ca8374fbd710cb750c4c5c.exe 83 PID 4420 wrote to memory of 216 4420 4a8bddd108ca8374fbd710cb750c4c5c.exe 83 PID 4420 wrote to memory of 216 4420 4a8bddd108ca8374fbd710cb750c4c5c.exe 83 PID 4420 wrote to memory of 1128 4420 4a8bddd108ca8374fbd710cb750c4c5c.exe 89 PID 4420 wrote to memory of 1128 4420 4a8bddd108ca8374fbd710cb750c4c5c.exe 89 PID 4420 wrote to memory of 1128 4420 4a8bddd108ca8374fbd710cb750c4c5c.exe 89 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 216 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a8bddd108ca8374fbd710cb750c4c5c.exe"C:\Users\Admin\AppData\Local\Temp\4a8bddd108ca8374fbd710cb750c4c5c.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\aiyhost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:216
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\4A8BDD~1.EXE > nul2⤵PID:1128
-
-
C:\Windows\Debug\aiyhost.exeC:\Windows\Debug\aiyhost.exe1⤵
- Executes dropped EXE
PID:464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD5204fa649d276244bc50222f14cf83407
SHA1385aab2f3a8b32467f689669795f3d2c29d133d4
SHA256a5c4f3a3309cf1bad7fd15b6e14bccf15b0c5c4697e8ca655de506c25abe2438
SHA512abf1de0c7e96989feb7caeda7ea5132ccc8918d0e43cc30715dc9155798db37e0fcf4352468d04a73cbdccdeb475e08f6184b3095a6f5ba1a7b6b261f9ab058f