Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2024 18:09
Static task
static1
Behavioral task
behavioral1
Sample
00778aea6b9734fe33df6d55a97cd93c69841865cc8afd573ca7f2c1b47e1d67.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
00778aea6b9734fe33df6d55a97cd93c69841865cc8afd573ca7f2c1b47e1d67.exe
Resource
win10v2004-20240426-en
General
-
Target
00778aea6b9734fe33df6d55a97cd93c69841865cc8afd573ca7f2c1b47e1d67.exe
-
Size
66KB
-
MD5
7f806bf9f0fb536f63aed0497819199c
-
SHA1
02c95f576bcebe91a6f5bb1229a033eecd4fc53f
-
SHA256
00778aea6b9734fe33df6d55a97cd93c69841865cc8afd573ca7f2c1b47e1d67
-
SHA512
910b9c40dc3978f5bf5e35f32cb0ef53322667822e3c8e61445d566cdbc17aaf5913d02735dc6b88edc83bb54bff0bd970a15522fe87bb3e3b7d3d8b8073349e
-
SSDEEP
1536:mUL/o7EjR2I0WtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZsryrEgxSj:mq/5jMIPtdgI2MyzNORQtOflIwoHNV2H
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation 00778aea6b9734fe33df6d55a97cd93c69841865cc8afd573ca7f2c1b47e1d67.exe -
Executes dropped EXE 1 IoCs
pid Process 2404 ghyte.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3704 wrote to memory of 2404 3704 00778aea6b9734fe33df6d55a97cd93c69841865cc8afd573ca7f2c1b47e1d67.exe 83 PID 3704 wrote to memory of 2404 3704 00778aea6b9734fe33df6d55a97cd93c69841865cc8afd573ca7f2c1b47e1d67.exe 83 PID 3704 wrote to memory of 2404 3704 00778aea6b9734fe33df6d55a97cd93c69841865cc8afd573ca7f2c1b47e1d67.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\00778aea6b9734fe33df6d55a97cd93c69841865cc8afd573ca7f2c1b47e1d67.exe"C:\Users\Admin\AppData\Local\Temp\00778aea6b9734fe33df6d55a97cd93c69841865cc8afd573ca7f2c1b47e1d67.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\ghyte.exe"C:\Users\Admin\AppData\Local\Temp\ghyte.exe"2⤵
- Executes dropped EXE
PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5b7b976b8ab453c7ba739f1b32994e533
SHA16263179264aeca037ccf16b364c0386e3a857773
SHA256673d82d2eb73fbf244e823b5f9176378536f52c16a69a1b2239006fde3d9c86d
SHA512f4b94335a7f7520b5ead86b802e56e912593002c01a37a71dad377d0348c792a2461bf7e7a78a1563819c31a953707b94eb7ec16a486bd62e3ce779c52d22854