Overview
overview
10Static
static
71.exe
windows11-21h2-x64
7Fallen.exe
windows11-21h2-x64
7Inte.exe
windows11-21h2-x64
7LX64
windows11-21h2-x64
1Server.exe
windows11-21h2-x64
7hfs.exe
windows11-21h2-x64
10hfs_1.exe
windows11-21h2-x64
10hg
windows11-21h2-x64
1java
windows11-21h2-x64
1moren.exe
windows11-21h2-x64
10Resubmissions
02-08-2024 16:33
240802-t2wr5s1eqj 10Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
02-08-2024 16:33
Behavioral task
behavioral1
Sample
1.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
Fallen.exe
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
Inte.exe
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
LX64
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
Server.exe
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
hfs.exe
Resource
win11-20240730-en
Behavioral task
behavioral7
Sample
hfs_1.exe
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
hg
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
java
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
moren.exe
Resource
win11-20240802-en
General
-
Target
Server.exe
-
Size
96KB
-
MD5
bfd0dcf57209068cc25907ff8ddc17e1
-
SHA1
8b913990c8691231e1d8e249d6d7f9a59b85dc1e
-
SHA256
8a16390f705599cacaba51ccf440f7f0a8320e614f71710a594312756788b28d
-
SHA512
8a2838fd69419a249a37b7569a7c0333e8c36a71df0dc7b8ea414f87392b42e885bcd3fc41b6bda181c6f69d98a5a5367d06b8ff6c7d3e577ea4d2581c2bfe09
-
SSDEEP
1536:GRtxXnig5/VUJyWryEXe8T1g6hypxc/lkJ5jj1fV8cGDmtB:GhN5/VmbTC6hyQ/OJRj1V8cGCtB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 1700 svchost.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Program Files directory 3 IoCs
Processes:
Server.exedescription ioc process File opened for modification C:\Program Files\meouau Server.exe File created C:\Program Files\meouau\svchost.exe Server.exe File opened for modification C:\Program Files\meouau\svchost.exe Server.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exeServer.exesvchost.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Server.exedescription pid process Token: SeIncBasePriorityPrivilege 1284 Server.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Server.exedescription pid process target process PID 1284 wrote to memory of 1996 1284 Server.exe cmd.exe PID 1284 wrote to memory of 1996 1284 Server.exe cmd.exe PID 1284 wrote to memory of 1996 1284 Server.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\Server.exe > nul2⤵
- System Location Discovery: System Language Discovery
PID:1996
-
C:\Program Files\meouau\svchost.exe"C:\Program Files\meouau\svchost.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5bfd0dcf57209068cc25907ff8ddc17e1
SHA18b913990c8691231e1d8e249d6d7f9a59b85dc1e
SHA2568a16390f705599cacaba51ccf440f7f0a8320e614f71710a594312756788b28d
SHA5128a2838fd69419a249a37b7569a7c0333e8c36a71df0dc7b8ea414f87392b42e885bcd3fc41b6bda181c6f69d98a5a5367d06b8ff6c7d3e577ea4d2581c2bfe09