Analysis
-
max time kernel
111s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 03:01
Static task
static1
Behavioral task
behavioral1
Sample
6005a146de106a3bd5cce4a1980e5650N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6005a146de106a3bd5cce4a1980e5650N.exe
Resource
win10v2004-20240709-en
General
-
Target
6005a146de106a3bd5cce4a1980e5650N.exe
-
Size
63KB
-
MD5
6005a146de106a3bd5cce4a1980e5650
-
SHA1
49ca8661752c9b40ae3099d6f51fcf96e6fc162b
-
SHA256
46bf873406ef28e96eab03e783ff68b1a45c0e512c200706eb27a338d4f1458f
-
SHA512
f516ec5eba9c0c1eb7a2aa045decaf83178f8630f568d1395ed730d1526e7c332b0fd0081b1f3f90167b12dea32794fee5ac8273562f6e49a4e1bd2aa5f55190
-
SSDEEP
768:OrItKyw5WHXfQmjIiIk9ecAa6cMb964yXhDLdr:Or3Z5IfQmv81awvyX5Zr
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 4456 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation 6005a146de106a3bd5cce4a1980e5650N.exe -
Executes dropped EXE 1 IoCs
pid Process 2820 wmahost.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Debug\wmahost.exe 6005a146de106a3bd5cce4a1980e5650N.exe File opened for modification C:\Windows\Debug\wmahost.exe 6005a146de106a3bd5cce4a1980e5650N.exe File opened for modification C:\Windows\Debug\wmahost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6005a146de106a3bd5cce4a1980e5650N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmahost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3932 6005a146de106a3bd5cce4a1980e5650N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3932 wrote to memory of 4456 3932 6005a146de106a3bd5cce4a1980e5650N.exe 84 PID 3932 wrote to memory of 4456 3932 6005a146de106a3bd5cce4a1980e5650N.exe 84 PID 3932 wrote to memory of 4456 3932 6005a146de106a3bd5cce4a1980e5650N.exe 84 PID 3932 wrote to memory of 4844 3932 6005a146de106a3bd5cce4a1980e5650N.exe 90 PID 3932 wrote to memory of 4844 3932 6005a146de106a3bd5cce4a1980e5650N.exe 90 PID 3932 wrote to memory of 4844 3932 6005a146de106a3bd5cce4a1980e5650N.exe 90 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4456 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6005a146de106a3bd5cce4a1980e5650N.exe"C:\Users\Admin\AppData\Local\Temp\6005a146de106a3bd5cce4a1980e5650N.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\wmahost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4456
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\6005A1~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:4844
-
-
C:\Windows\Debug\wmahost.exeC:\Windows\Debug\wmahost.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD562d43fd4ed33184579c8eb31d80f3dc2
SHA1cf7b88afb4b0925e36f6c2beefa18a3bbf941976
SHA256a25b06b6a756afefe5c5002a207bddc344a941754c25a2aac24444796dad5b6b
SHA512bbb29a8ba06da8e9b0437938765d9c4f193eb14b8a2e6cfcc7cf8e8df24cf9d3dfbb2a93e12b55f9f030b20a51e476a0cd5ec415ef4a95641ad81766b780572d