Analysis
-
max time kernel
111s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 18:12
Behavioral task
behavioral1
Sample
76bfb4f2ac7431fbab7c1fc96a00cc90N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
76bfb4f2ac7431fbab7c1fc96a00cc90N.exe
Resource
win10v2004-20240802-en
General
-
Target
76bfb4f2ac7431fbab7c1fc96a00cc90N.exe
-
Size
23KB
-
MD5
76bfb4f2ac7431fbab7c1fc96a00cc90
-
SHA1
39ce04d2800a8233e467b349dee09c9d88e6dba0
-
SHA256
616e3aafa3c2521aaf2ac14cbbd9fc600a176e71d64b8ced6fe09b82730654c8
-
SHA512
bf6bdc5644bcd5bc12b03f902d54a51f8ffa8ec3752c8a15ec7f7ffa4292a231762f72549cfcb06184e59bbca394e7415795fec9821cc230ba1e1cd7cdd6c9ae
-
SSDEEP
384:+J5+c5mibCpKAjndr3Vo4G/usaNJawcudoD7UXlOIJquYz:uAcYimoqdm9gnbcuyD7U19K
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2292 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation 76bfb4f2ac7431fbab7c1fc96a00cc90N.exe -
Executes dropped EXE 1 IoCs
pid Process 3104 mewhost.exe -
resource yara_rule behavioral2/memory/3372-0-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/files/0x00080000000234c1-3.dat upx behavioral2/memory/3372-5-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/3104-6-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/3104-9-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/3104-12-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/3104-15-0x0000000000400000-0x0000000000416000-memory.dmp upx -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Debug\mewhost.exe 76bfb4f2ac7431fbab7c1fc96a00cc90N.exe File opened for modification C:\Windows\Debug\mewhost.exe 76bfb4f2ac7431fbab7c1fc96a00cc90N.exe File opened for modification C:\Windows\Debug\mewhost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 76bfb4f2ac7431fbab7c1fc96a00cc90N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mewhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3372 76bfb4f2ac7431fbab7c1fc96a00cc90N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3372 wrote to memory of 2292 3372 76bfb4f2ac7431fbab7c1fc96a00cc90N.exe 84 PID 3372 wrote to memory of 2292 3372 76bfb4f2ac7431fbab7c1fc96a00cc90N.exe 84 PID 3372 wrote to memory of 2292 3372 76bfb4f2ac7431fbab7c1fc96a00cc90N.exe 84 PID 3372 wrote to memory of 3840 3372 76bfb4f2ac7431fbab7c1fc96a00cc90N.exe 89 PID 3372 wrote to memory of 3840 3372 76bfb4f2ac7431fbab7c1fc96a00cc90N.exe 89 PID 3372 wrote to memory of 3840 3372 76bfb4f2ac7431fbab7c1fc96a00cc90N.exe 89 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2292 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\76bfb4f2ac7431fbab7c1fc96a00cc90N.exe"C:\Users\Admin\AppData\Local\Temp\76bfb4f2ac7431fbab7c1fc96a00cc90N.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\mewhost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2292
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\76BFB4~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:3840
-
-
C:\Windows\Debug\mewhost.exeC:\Windows\Debug\mewhost.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD55c3f5041ec221d3aaeec2c8d0f90ebe4
SHA14cdf00a9ce34f605ae4e3bb48c4890e6ed157e40
SHA256ec5ab35f173971057685e13ef2f8bf42e411f2bc8c7b80229019568e32af6171
SHA512d7e51679c50f94fac6c72d5278132b67844be7c72dc7bbe4f249d283e316bdb1dca54c5fe6b200b508297e78dc66cd78db8d86d9e375cc077c6184942be39a80