Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 21:29
Static task
static1
Behavioral task
behavioral1
Sample
057e8e525e0103040c50443808653800N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
057e8e525e0103040c50443808653800N.exe
Resource
win10v2004-20240730-en
General
-
Target
057e8e525e0103040c50443808653800N.exe
-
Size
79KB
-
MD5
057e8e525e0103040c50443808653800
-
SHA1
7a3bf03dbe7f09bcf417959f78b5c05f1abf8b56
-
SHA256
909aac331e27feee68dd9943af466e7883311fb4ecd37fc929a3b61b6553afcd
-
SHA512
11558ae13eff229491933d642f3de57fe6dc5dce4da09d7facee85e5e140d46102f57563d680c04178f8ac1070c8b8557a8d054f3efbb0aeeaa2e950df1d8654
-
SSDEEP
1536:RLFbQafrACEVLUQ/HItWt68/gQGSdsGizbR9XwzA:Jf8CE/HIM68/gtSsBPvwE
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-113082768-653872390-2867000172-1000\Control Panel\International\Geo\Nation 057e8e525e0103040c50443808653800N.exe -
Executes dropped EXE 1 IoCs
pid Process 3284 eiyhost.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Debug\eiyhost.exe 057e8e525e0103040c50443808653800N.exe File opened for modification C:\Windows\Debug\eiyhost.exe 057e8e525e0103040c50443808653800N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 057e8e525e0103040c50443808653800N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eiyhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 eiyhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz eiyhost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 760 057e8e525e0103040c50443808653800N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 760 wrote to memory of 1776 760 057e8e525e0103040c50443808653800N.exe 87 PID 760 wrote to memory of 1776 760 057e8e525e0103040c50443808653800N.exe 87 PID 760 wrote to memory of 1776 760 057e8e525e0103040c50443808653800N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\057e8e525e0103040c50443808653800N.exe"C:\Users\Admin\AppData\Local\Temp\057e8e525e0103040c50443808653800N.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\057E8E~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:1776
-
-
C:\Windows\Debug\eiyhost.exeC:\Windows\Debug\eiyhost.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD5bbba7120fcab9fdcd60606269c4f1a7e
SHA104d2507caefc342724fc780b04d4ef76fb44552f
SHA2566d667e70f78a8214287d800352320444eb623d3d99a985bd5ef35b86abc1b7be
SHA512d6150b4a05cc89e81a2467b87e4ff2dce56529ac539724419f5b4c66fa51bc76e53f0f87409eded28518566b2de10e737e9a6c1dcbc2c847a9b425cb2eb9d182