Analysis
-
max time kernel
111s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 13:03
Behavioral task
behavioral1
Sample
389be271777119b0ff7efe2a3714f130N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
389be271777119b0ff7efe2a3714f130N.exe
Resource
win10v2004-20240802-en
General
-
Target
389be271777119b0ff7efe2a3714f130N.exe
-
Size
23KB
-
MD5
389be271777119b0ff7efe2a3714f130
-
SHA1
1641c0c917d6c498775ff9577fb41bdf0cf7c6b2
-
SHA256
5b084762eda98304bfce1ad32426c4f08a41ad56790547d206b48461c008c118
-
SHA512
aa394196c3dbb1fd38dc43267ae3a1eda8c9ce5f946beebbb29808ee6c2589d70919af5a3a430c52aca0fe60356c5179c92dbbb5043bb038a1eb376797029e1b
-
SSDEEP
384:+J5+c5mibCpKAjndr3Vo4G/usaNJawcudoD7UXlOIJquYT:uAcYimoqdm9gnbcuyD7U19m
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 5004 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation 389be271777119b0ff7efe2a3714f130N.exe -
Executes dropped EXE 1 IoCs
pid Process 2404 bqchost.exe -
resource yara_rule behavioral2/memory/800-0-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/files/0x000900000002347c-3.dat upx behavioral2/memory/800-6-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/2404-7-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/2404-10-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/2404-13-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/2404-16-0x0000000000400000-0x0000000000416000-memory.dmp upx -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Debug\bqchost.exe 389be271777119b0ff7efe2a3714f130N.exe File opened for modification C:\Windows\Debug\bqchost.exe attrib.exe File created C:\Windows\Debug\bqchost.exe 389be271777119b0ff7efe2a3714f130N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bqchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 389be271777119b0ff7efe2a3714f130N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 800 389be271777119b0ff7efe2a3714f130N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 800 wrote to memory of 5004 800 389be271777119b0ff7efe2a3714f130N.exe 83 PID 800 wrote to memory of 5004 800 389be271777119b0ff7efe2a3714f130N.exe 83 PID 800 wrote to memory of 5004 800 389be271777119b0ff7efe2a3714f130N.exe 83 PID 800 wrote to memory of 2116 800 389be271777119b0ff7efe2a3714f130N.exe 89 PID 800 wrote to memory of 2116 800 389be271777119b0ff7efe2a3714f130N.exe 89 PID 800 wrote to memory of 2116 800 389be271777119b0ff7efe2a3714f130N.exe 89 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 5004 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\389be271777119b0ff7efe2a3714f130N.exe"C:\Users\Admin\AppData\Local\Temp\389be271777119b0ff7efe2a3714f130N.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\bqchost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5004
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\389BE2~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:2116
-
-
C:\Windows\Debug\bqchost.exeC:\Windows\Debug\bqchost.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5a3bb532c1f52ea3d1bf061597621329f
SHA127a7dbffca6489a9111d8e29a47fa67ac5420528
SHA2560246594ad73a1fd850cf5479c7aa3447d64ae98dd5cd0b8ede4c24b3aabf7255
SHA5120e6389ca1d5d9f8ce24f0f1802731948d340eb23f35ad9d9edba98e411bc58731050fd630eb57136e7001b82942638ddf71dbb4c19817f93d775a3dd4678bdf7