Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 22:50
Static task
static1
Behavioral task
behavioral1
Sample
6a5dda76cbaf4838b9696f67918f28c8b03289f8d79769e4e3bd19b6bb3fc3ab.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6a5dda76cbaf4838b9696f67918f28c8b03289f8d79769e4e3bd19b6bb3fc3ab.exe
Resource
win10v2004-20240426-en
General
-
Target
6a5dda76cbaf4838b9696f67918f28c8b03289f8d79769e4e3bd19b6bb3fc3ab.exe
-
Size
66KB
-
MD5
40aa71420bc9ddbfc6dde6b96a3cc3ba
-
SHA1
dd48eb22978cc99c99a10627f7a4d38a9a36d5e2
-
SHA256
6a5dda76cbaf4838b9696f67918f28c8b03289f8d79769e4e3bd19b6bb3fc3ab
-
SHA512
f27eca4356e5d7e1707843d450c5591e86897294e60c8dde582c841470b8c4053941aa11099d837587f5407a713a53e75f9f3c8c9465b70f308601433262cdde
-
SSDEEP
768:urItKyw5WHXfQmjIiIk9ecAaHSHMb96FyXRDLdXDffff3g:ur3Z5IfQmv81ayo2yXpZXU
Malware Config
Signatures
-
Detects Windows executables referencing non-Windows User-Agents 1 IoCs
resource yara_rule behavioral2/files/0x00090000000233f9-2.dat INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 4008 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation 6a5dda76cbaf4838b9696f67918f28c8b03289f8d79769e4e3bd19b6bb3fc3ab.exe -
Executes dropped EXE 1 IoCs
pid Process 2984 hyghost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Debug\hyghost.exe 6a5dda76cbaf4838b9696f67918f28c8b03289f8d79769e4e3bd19b6bb3fc3ab.exe File opened for modification C:\Windows\Debug\hyghost.exe 6a5dda76cbaf4838b9696f67918f28c8b03289f8d79769e4e3bd19b6bb3fc3ab.exe File opened for modification C:\Windows\Debug\hyghost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2596 6a5dda76cbaf4838b9696f67918f28c8b03289f8d79769e4e3bd19b6bb3fc3ab.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2596 wrote to memory of 4008 2596 6a5dda76cbaf4838b9696f67918f28c8b03289f8d79769e4e3bd19b6bb3fc3ab.exe 82 PID 2596 wrote to memory of 4008 2596 6a5dda76cbaf4838b9696f67918f28c8b03289f8d79769e4e3bd19b6bb3fc3ab.exe 82 PID 2596 wrote to memory of 4008 2596 6a5dda76cbaf4838b9696f67918f28c8b03289f8d79769e4e3bd19b6bb3fc3ab.exe 82 PID 2596 wrote to memory of 1744 2596 6a5dda76cbaf4838b9696f67918f28c8b03289f8d79769e4e3bd19b6bb3fc3ab.exe 87 PID 2596 wrote to memory of 1744 2596 6a5dda76cbaf4838b9696f67918f28c8b03289f8d79769e4e3bd19b6bb3fc3ab.exe 87 PID 2596 wrote to memory of 1744 2596 6a5dda76cbaf4838b9696f67918f28c8b03289f8d79769e4e3bd19b6bb3fc3ab.exe 87 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4008 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a5dda76cbaf4838b9696f67918f28c8b03289f8d79769e4e3bd19b6bb3fc3ab.exe"C:\Users\Admin\AppData\Local\Temp\6a5dda76cbaf4838b9696f67918f28c8b03289f8d79769e4e3bd19b6bb3fc3ab.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\hyghost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:4008
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\6A5DDA~1.EXE > nul2⤵PID:1744
-
-
C:\Windows\Debug\hyghost.exeC:\Windows\Debug\hyghost.exe1⤵
- Executes dropped EXE
PID:2984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5bb6017721a53cd05a631d309c18a86d2
SHA174bff840691f81d8eb170b999354f1298c37eb96
SHA256a924a1b3e19a074b07958c75635f594942c7fd7a0d547bdc31e7343c8ec63f0d
SHA512c2b399f88f72d6c7dbe19c5ac378f0b93f274fe0242a2af2dd1ca99328a05907d14f0f9c55dab2a20c03a878fece5d1ea5f09342e5a2cba86bf495f5aa4ca1fe