Analysis
-
max time kernel
112s -
max time network
96s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 21:12
Static task
static1
Behavioral task
behavioral1
Sample
0ea144fcc6f164e3a2920ea1be195290N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
0ea144fcc6f164e3a2920ea1be195290N.exe
Resource
win10v2004-20240709-en
General
-
Target
0ea144fcc6f164e3a2920ea1be195290N.exe
-
Size
27KB
-
MD5
0ea144fcc6f164e3a2920ea1be195290
-
SHA1
e4f4d273962b4294b7df78a352a5d36815cfb811
-
SHA256
a3fbbc803ac92b6b3f98c34c43928ba9bb866e81c0f6d9b1865ea03e3cece86c
-
SHA512
1bd2d80055fe5ad0be7a48a1e77a91587b06b1e1048a94e316f74d79d5c31dec653d478effade7f2baff3082fa06d85443c6e250c9ba0fc4b76933764a1116dc
-
SSDEEP
384:MqvAXxH6zoHAcIWed4+kSLqrXla7vvxlLjlB/:zWxMoHNed6a7DZh
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1664 attrib.exe -
Deletes itself 1 IoCs
pid Process 2324 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1736 acahost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Debug\acahost.exe 0ea144fcc6f164e3a2920ea1be195290N.exe File opened for modification C:\Windows\Debug\acahost.exe 0ea144fcc6f164e3a2920ea1be195290N.exe File opened for modification C:\Windows\Debug\acahost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3048 0ea144fcc6f164e3a2920ea1be195290N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3048 wrote to memory of 1664 3048 0ea144fcc6f164e3a2920ea1be195290N.exe 29 PID 3048 wrote to memory of 1664 3048 0ea144fcc6f164e3a2920ea1be195290N.exe 29 PID 3048 wrote to memory of 1664 3048 0ea144fcc6f164e3a2920ea1be195290N.exe 29 PID 3048 wrote to memory of 1664 3048 0ea144fcc6f164e3a2920ea1be195290N.exe 29 PID 3048 wrote to memory of 2324 3048 0ea144fcc6f164e3a2920ea1be195290N.exe 32 PID 3048 wrote to memory of 2324 3048 0ea144fcc6f164e3a2920ea1be195290N.exe 32 PID 3048 wrote to memory of 2324 3048 0ea144fcc6f164e3a2920ea1be195290N.exe 32 PID 3048 wrote to memory of 2324 3048 0ea144fcc6f164e3a2920ea1be195290N.exe 32 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1664 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ea144fcc6f164e3a2920ea1be195290N.exe"C:\Users\Admin\AppData\Local\Temp\0ea144fcc6f164e3a2920ea1be195290N.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\acahost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:1664
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\0EA144~1.EXE > nul2⤵
- Deletes itself
PID:2324
-
-
C:\Windows\Debug\acahost.exeC:\Windows\Debug\acahost.exe1⤵
- Executes dropped EXE
PID:1736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD59e0def779d6e2bb83acd00d729ea3434
SHA1b1474937611bcd0603a68817a830d7855432e523
SHA256addc88163a5670a3f7789daed35ba4362f30c4a5b8a28ad9a39834891bea680b
SHA512167a08c54f7c065f8567c97982fcdcf834656c880c5ff01dd8a206bf7ce67d9a9d65db2f33c59ebc15f005e95c7efa2d1e34531ae1cc4b7ca285cfdd9e98d714