Analysis
-
max time kernel
111s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 00:14
Behavioral task
behavioral1
Sample
03d9907796b6a0520cd7816d9e5d5500N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
03d9907796b6a0520cd7816d9e5d5500N.exe
Resource
win10v2004-20240802-en
General
-
Target
03d9907796b6a0520cd7816d9e5d5500N.exe
-
Size
63KB
-
MD5
03d9907796b6a0520cd7816d9e5d5500
-
SHA1
090466b25bc0bb93bb907948ab123c4cfaac188a
-
SHA256
068b11dfd54c70eef5005a080a163e6151e625b77936e06c49ad64684434b3ae
-
SHA512
3ac5849ff9b88f63a6e65c26218db692dbefd35b5f221d66f47ad394b84c7c2a376f6c408e2a1ad5d4c04c27a695ef6a90dd116d6ec83642969719d4b645f310
-
SSDEEP
1536:fvQoLHjw2iWPKMvw71oLyXQUUqnouy8YXVvvvZeee5Lttttn:fv5Ls27BIJoLyXTUyoutYXveeeRttttn
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation 03d9907796b6a0520cd7816d9e5d5500N.exe -
Executes dropped EXE 1 IoCs
pid Process 388 tuehost.exe -
resource yara_rule behavioral2/memory/3604-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/files/0x000e0000000233fa-3.dat upx behavioral2/memory/3604-5-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/388-6-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Debug\tuehost.exe 03d9907796b6a0520cd7816d9e5d5500N.exe File opened for modification C:\Windows\Debug\tuehost.exe 03d9907796b6a0520cd7816d9e5d5500N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 03d9907796b6a0520cd7816d9e5d5500N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tuehost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 tuehost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz tuehost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3604 03d9907796b6a0520cd7816d9e5d5500N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3604 wrote to memory of 1724 3604 03d9907796b6a0520cd7816d9e5d5500N.exe 89 PID 3604 wrote to memory of 1724 3604 03d9907796b6a0520cd7816d9e5d5500N.exe 89 PID 3604 wrote to memory of 1724 3604 03d9907796b6a0520cd7816d9e5d5500N.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\03d9907796b6a0520cd7816d9e5d5500N.exe"C:\Users\Admin\AppData\Local\Temp\03d9907796b6a0520cd7816d9e5d5500N.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\03D990~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:1724
-
-
C:\Windows\Debug\tuehost.exeC:\Windows\Debug\tuehost.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD550ec58553b97ae21d317803479dd0790
SHA11ac218cf56af078631eabce7b7e0f46f024a9afd
SHA256383be64ef8a008cf628107c5a754fda9c88c0864ff6769e4c9bfa11ab7823824
SHA51215763ab8f6c43f7f3eb2cdf1fcc8e89d1b837c14e2a8907fe6e517ed0f86d0845364ae1d396ca2a99a5cd5a6b5a82725c5d31db421a7e609d7357bd0095d9f9e