Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
29/04/2024, 13:55
Behavioral task
behavioral1
Sample
6aaa5d43e77ac18d068fd3303d6b1771.exe
Resource
win7-20240221-en
General
-
Target
6aaa5d43e77ac18d068fd3303d6b1771.exe
-
Size
157KB
-
MD5
6aaa5d43e77ac18d068fd3303d6b1771
-
SHA1
8f463ef3eb6c781234de796d109a2d8ea87ae049
-
SHA256
3b3169aa8f0f041219dd073fceed09abb39c39b50e0faf4d566ac9b4e937db2b
-
SHA512
033a7725e45bdf4694c710537842a6f7f14b34c74950993e719d3e415ca36cc4ce3359abf2d30765c421ad9605393b56fbb416520395ca341316f5b4eb748ccb
-
SSDEEP
384:+GXqt4YDuuOFZyUVpULCgDb2prxVTn24FHD6Al6z+yXgf0BHkZ5zsmRZDmZ6/lw1:bX0ZDcZyUpULCgo2aj96ayXbQzTZ/9fm
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 3996 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation 6aaa5d43e77ac18d068fd3303d6b1771.exe -
Executes dropped EXE 1 IoCs
pid Process 4236 dauhost.exe -
resource yara_rule behavioral2/memory/828-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000d000000023b24-3.dat upx behavioral2/memory/828-5-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4236-6-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Debug\dauhost.exe 6aaa5d43e77ac18d068fd3303d6b1771.exe File opened for modification C:\Windows\Debug\dauhost.exe 6aaa5d43e77ac18d068fd3303d6b1771.exe File opened for modification C:\Windows\Debug\dauhost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 828 6aaa5d43e77ac18d068fd3303d6b1771.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 828 wrote to memory of 3996 828 6aaa5d43e77ac18d068fd3303d6b1771.exe 83 PID 828 wrote to memory of 3996 828 6aaa5d43e77ac18d068fd3303d6b1771.exe 83 PID 828 wrote to memory of 3996 828 6aaa5d43e77ac18d068fd3303d6b1771.exe 83 PID 828 wrote to memory of 4624 828 6aaa5d43e77ac18d068fd3303d6b1771.exe 89 PID 828 wrote to memory of 4624 828 6aaa5d43e77ac18d068fd3303d6b1771.exe 89 PID 828 wrote to memory of 4624 828 6aaa5d43e77ac18d068fd3303d6b1771.exe 89 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3996 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6aaa5d43e77ac18d068fd3303d6b1771.exe"C:\Users\Admin\AppData\Local\Temp\6aaa5d43e77ac18d068fd3303d6b1771.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\dauhost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:3996
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\6AAA5D~1.EXE > nul2⤵PID:4624
-
-
C:\Windows\Debug\dauhost.exeC:\Windows\Debug\dauhost.exe1⤵
- Executes dropped EXE
PID:4236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
157KB
MD5307a2c1325fb0ce9203d9e5b228c0967
SHA1fdfd1d98148ee74f3ce5809ebdad95df09bc8721
SHA25665b51e57d261608a7f016cdb64102cfdfec4ceff5387dcbc1aab6b79eabe47cc
SHA51208caba10982aaa83d987d20e0fb0df3a3c1c8bdbbf86599f4ec7f0c8b4127c236cd67f11bca013cfcbacd1145884576b4d26fc15c31bcbd7da91c08a318207e4