Analysis
-
max time kernel
141s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 04:37
Behavioral task
behavioral1
Sample
e9b52f3662e306cd55401b5e755e8eff28d185e9586207cb696299f0277f12fb.exe
Resource
win7-20240508-en
General
-
Target
e9b52f3662e306cd55401b5e755e8eff28d185e9586207cb696299f0277f12fb.exe
-
Size
15KB
-
MD5
b525d4cdf2c87f49308c0ff102831385
-
SHA1
4f72728c2fc111be59fd8b1f2b6bd1bca0edd8ab
-
SHA256
e9b52f3662e306cd55401b5e755e8eff28d185e9586207cb696299f0277f12fb
-
SHA512
12f8407251641216131f4d05493a7e1e7c37cca245aef5169f9be05289bd776fc0a3c4d1c8dd8fc1ecb64ce0f7afda0d3f12233ca7e285a85ace9b2db2e867c0
-
SSDEEP
384:IO3qdXlIQV0YXd45xuYiMcRWnPbeVGWLp:IO3EVdV0YXd4DuicNV3F
Malware Config
Signatures
-
Detects Windows executables referencing non-Windows User-Agents 6 IoCs
resource yara_rule behavioral1/memory/2980-7-0x0000000000400000-0x0000000000414000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2936-8-0x0000000000400000-0x0000000000414000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2936-11-0x0000000000400000-0x0000000000414000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2936-14-0x0000000000400000-0x0000000000414000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2936-17-0x0000000000400000-0x0000000000414000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2936-20-0x0000000000400000-0x0000000000414000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
UPX dump on OEP (original entry point) 9 IoCs
resource yara_rule behavioral1/memory/2980-0-0x0000000000400000-0x0000000000414000-memory.dmp UPX behavioral1/files/0x000c00000001227b-3.dat UPX behavioral1/memory/2936-5-0x0000000000400000-0x0000000000414000-memory.dmp UPX behavioral1/memory/2980-7-0x0000000000400000-0x0000000000414000-memory.dmp UPX behavioral1/memory/2936-8-0x0000000000400000-0x0000000000414000-memory.dmp UPX behavioral1/memory/2936-11-0x0000000000400000-0x0000000000414000-memory.dmp UPX behavioral1/memory/2936-14-0x0000000000400000-0x0000000000414000-memory.dmp UPX behavioral1/memory/2936-17-0x0000000000400000-0x0000000000414000-memory.dmp UPX behavioral1/memory/2936-20-0x0000000000400000-0x0000000000414000-memory.dmp UPX -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2852 attrib.exe -
Deletes itself 1 IoCs
pid Process 2604 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2936 ayahost.exe -
resource yara_rule behavioral1/memory/2980-0-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/files/0x000c00000001227b-3.dat upx behavioral1/memory/2936-5-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/2980-7-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/2936-8-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/2936-11-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/2936-14-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/2936-17-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/2936-20-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Debug\ayahost.exe e9b52f3662e306cd55401b5e755e8eff28d185e9586207cb696299f0277f12fb.exe File opened for modification C:\Windows\Debug\ayahost.exe e9b52f3662e306cd55401b5e755e8eff28d185e9586207cb696299f0277f12fb.exe File opened for modification C:\Windows\Debug\ayahost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2980 e9b52f3662e306cd55401b5e755e8eff28d185e9586207cb696299f0277f12fb.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2852 2980 e9b52f3662e306cd55401b5e755e8eff28d185e9586207cb696299f0277f12fb.exe 28 PID 2980 wrote to memory of 2852 2980 e9b52f3662e306cd55401b5e755e8eff28d185e9586207cb696299f0277f12fb.exe 28 PID 2980 wrote to memory of 2852 2980 e9b52f3662e306cd55401b5e755e8eff28d185e9586207cb696299f0277f12fb.exe 28 PID 2980 wrote to memory of 2852 2980 e9b52f3662e306cd55401b5e755e8eff28d185e9586207cb696299f0277f12fb.exe 28 PID 2980 wrote to memory of 2604 2980 e9b52f3662e306cd55401b5e755e8eff28d185e9586207cb696299f0277f12fb.exe 31 PID 2980 wrote to memory of 2604 2980 e9b52f3662e306cd55401b5e755e8eff28d185e9586207cb696299f0277f12fb.exe 31 PID 2980 wrote to memory of 2604 2980 e9b52f3662e306cd55401b5e755e8eff28d185e9586207cb696299f0277f12fb.exe 31 PID 2980 wrote to memory of 2604 2980 e9b52f3662e306cd55401b5e755e8eff28d185e9586207cb696299f0277f12fb.exe 31 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2852 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9b52f3662e306cd55401b5e755e8eff28d185e9586207cb696299f0277f12fb.exe"C:\Users\Admin\AppData\Local\Temp\e9b52f3662e306cd55401b5e755e8eff28d185e9586207cb696299f0277f12fb.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\ayahost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:2852
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\E9B52F~1.EXE > nul2⤵
- Deletes itself
PID:2604
-
-
C:\Windows\Debug\ayahost.exeC:\Windows\Debug\ayahost.exe1⤵
- Executes dropped EXE
PID:2936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD535d67b57c0aa8f2f1b2d4e4776a7128c
SHA19c3b051175c03bc0b4136639edf6f25a9a501fc9
SHA2566236c91fcf5639671e70325d410c5e92ef4cb816ce7ce469cf2a0ed0bdb2a873
SHA512fb958154b0df5e90d8777f1ba8ee5b5451f1430e5d863c0a9e4ae4c42a7cb44a1ab633089d9d339dfcce33eed41f382ef57dfd069dcd4324eabd75f783af2804