Analysis
-
max time kernel
111s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 17:44
Static task
static1
Behavioral task
behavioral1
Sample
d87c584792750d405ab939ad4db56a70N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
d87c584792750d405ab939ad4db56a70N.exe
Resource
win10v2004-20240802-en
General
-
Target
d87c584792750d405ab939ad4db56a70N.exe
-
Size
75KB
-
MD5
d87c584792750d405ab939ad4db56a70
-
SHA1
f13a815a158af471d95cefacc77321dced50ab15
-
SHA256
3172909c1e78a285676e68202502bff165b33af0bc56daa3a056ebea784f7a95
-
SHA512
01d9443e3643ccac42ddd6794dde9982406a4dee47d1830b125cbcec1c5fa770b2930b38231a1e8c022d413fab6face034f50e565ea819a0fbc440446f35920e
-
SSDEEP
768:ZrItKyw5WHXfQmjIiIk9ecAx7pP1EPU96MyXPdtldE9bIIIwjkg:Zr3Z5IfQmv81x7pP1r3yXPdtnyjp
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1996 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation d87c584792750d405ab939ad4db56a70N.exe -
Executes dropped EXE 1 IoCs
pid Process 1260 mewhost.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Debug\mewhost.exe d87c584792750d405ab939ad4db56a70N.exe File opened for modification C:\Windows\Debug\mewhost.exe d87c584792750d405ab939ad4db56a70N.exe File opened for modification C:\Windows\Debug\mewhost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d87c584792750d405ab939ad4db56a70N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mewhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 mewhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz mewhost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4244 d87c584792750d405ab939ad4db56a70N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4244 wrote to memory of 1996 4244 d87c584792750d405ab939ad4db56a70N.exe 84 PID 4244 wrote to memory of 1996 4244 d87c584792750d405ab939ad4db56a70N.exe 84 PID 4244 wrote to memory of 1996 4244 d87c584792750d405ab939ad4db56a70N.exe 84 PID 4244 wrote to memory of 2184 4244 d87c584792750d405ab939ad4db56a70N.exe 90 PID 4244 wrote to memory of 2184 4244 d87c584792750d405ab939ad4db56a70N.exe 90 PID 4244 wrote to memory of 2184 4244 d87c584792750d405ab939ad4db56a70N.exe 90 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1996 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d87c584792750d405ab939ad4db56a70N.exe"C:\Users\Admin\AppData\Local\Temp\d87c584792750d405ab939ad4db56a70N.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\mewhost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1996
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\D87C58~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:2184
-
-
C:\Windows\Debug\mewhost.exeC:\Windows\Debug\mewhost.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75KB
MD593aa085853d21b8c98e301e93a93ab81
SHA126f86f4904bca2abd3525286b3b699577371a940
SHA2569cebb46c788ba56b81fe246315d8f91a0c1b27383abbb07abdf0520f4d13d3ea
SHA5124791ded84ec882f267240d9dfddb5f32b5a87a90fd2f1dded4326ae23d986c6280012cf451a30f27d94683c92706e9bd7c634315cb23c567e2c4b8e60d540e4a