Analysis
-
max time kernel
110s -
max time network
96s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 14:11
Behavioral task
behavioral1
Sample
645a56cab20008b072427ab4c05e44a0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
645a56cab20008b072427ab4c05e44a0N.exe
Resource
win10v2004-20240802-en
General
-
Target
645a56cab20008b072427ab4c05e44a0N.exe
-
Size
166KB
-
MD5
645a56cab20008b072427ab4c05e44a0
-
SHA1
ee436b249cfa7b3a8c8247f8f4d5731355be5b83
-
SHA256
c236d2b1c61673115c1bea56ed4d80005ff34beae4cb5dd6fd67554fc2af40bf
-
SHA512
05a10c4d6014225a2af4616b8fec0343fd67396cf081c28bb338e3aa3bd5dda12c40dd3467709487946e5ccf54fc0a6d76a0a71ffa0d9c87510c64345ba0b85b
-
SSDEEP
1536:i2WDcOpULCH0a+TNXyyXetH28JZveKivnV:zWDuLzZXyyXeECveDnV
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2316 attrib.exe -
Deletes itself 1 IoCs
pid Process 2664 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2036 okehost.exe -
resource yara_rule behavioral1/memory/1696-0-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2036-5-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/files/0x00090000000120f9-4.dat upx behavioral1/memory/1696-6-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2036-7-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Debug\okehost.exe 645a56cab20008b072427ab4c05e44a0N.exe File opened for modification C:\Windows\Debug\okehost.exe 645a56cab20008b072427ab4c05e44a0N.exe File opened for modification C:\Windows\Debug\okehost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language okehost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 645a56cab20008b072427ab4c05e44a0N.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 okehost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz okehost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1696 645a56cab20008b072427ab4c05e44a0N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2316 1696 645a56cab20008b072427ab4c05e44a0N.exe 29 PID 1696 wrote to memory of 2316 1696 645a56cab20008b072427ab4c05e44a0N.exe 29 PID 1696 wrote to memory of 2316 1696 645a56cab20008b072427ab4c05e44a0N.exe 29 PID 1696 wrote to memory of 2316 1696 645a56cab20008b072427ab4c05e44a0N.exe 29 PID 1696 wrote to memory of 2664 1696 645a56cab20008b072427ab4c05e44a0N.exe 32 PID 1696 wrote to memory of 2664 1696 645a56cab20008b072427ab4c05e44a0N.exe 32 PID 1696 wrote to memory of 2664 1696 645a56cab20008b072427ab4c05e44a0N.exe 32 PID 1696 wrote to memory of 2664 1696 645a56cab20008b072427ab4c05e44a0N.exe 32 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2316 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\645a56cab20008b072427ab4c05e44a0N.exe"C:\Users\Admin\AppData\Local\Temp\645a56cab20008b072427ab4c05e44a0N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\okehost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2316
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\645A56~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2664
-
-
C:\Windows\Debug\okehost.exeC:\Windows\Debug\okehost.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
166KB
MD580b760fb08fa316fd7b595efa29edc6f
SHA1181183c8bb893771aff4bca1a4fbf9895cba993b
SHA25680972cbdf3ed27e918c069b0e03b95ff333346b5a30c412b6761ed0a3d013d70
SHA51209fead3d6863863b873295c6a20048cd8cbd3a9f1e6a3627a1ae17338d7ae7f99d4f45a34558c009cbef8721206523a944b8e5076b3405a1746fedae00d745a5