Analysis
-
max time kernel
110s -
max time network
92s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 08:24
Static task
static1
Behavioral task
behavioral1
Sample
5b73c28e57c07f47f8be6f98350f7900N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5b73c28e57c07f47f8be6f98350f7900N.exe
Resource
win10v2004-20240802-en
General
-
Target
5b73c28e57c07f47f8be6f98350f7900N.exe
-
Size
63KB
-
MD5
5b73c28e57c07f47f8be6f98350f7900
-
SHA1
181dc9ef17db73ca1827b49a757e606ebb0930a5
-
SHA256
1b7f168df6fa76650fb1964088d07c50939c7811f3b523fcb67a832bb7492c4d
-
SHA512
e7d4d81abf448e8eca429b3e3922769aa448f26f950e7c81131033d0d719833773a053c93fdb9bf4121a9bd60128c556590412af36f15642b664a0c7feee4c37
-
SSDEEP
768:MDcpEBMLfQcubV5wGE96YyXDTLdEBBBBL6666s:MDcfLfIbtEbyXfZt
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1836 attrib.exe -
Deletes itself 1 IoCs
pid Process 1696 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1708 iuyhost.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Debug\iuyhost.exe 5b73c28e57c07f47f8be6f98350f7900N.exe File opened for modification C:\Windows\Debug\iuyhost.exe 5b73c28e57c07f47f8be6f98350f7900N.exe File opened for modification C:\Windows\Debug\iuyhost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iuyhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5b73c28e57c07f47f8be6f98350f7900N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2584 5b73c28e57c07f47f8be6f98350f7900N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2584 wrote to memory of 1836 2584 5b73c28e57c07f47f8be6f98350f7900N.exe 30 PID 2584 wrote to memory of 1836 2584 5b73c28e57c07f47f8be6f98350f7900N.exe 30 PID 2584 wrote to memory of 1836 2584 5b73c28e57c07f47f8be6f98350f7900N.exe 30 PID 2584 wrote to memory of 1836 2584 5b73c28e57c07f47f8be6f98350f7900N.exe 30 PID 2584 wrote to memory of 1696 2584 5b73c28e57c07f47f8be6f98350f7900N.exe 33 PID 2584 wrote to memory of 1696 2584 5b73c28e57c07f47f8be6f98350f7900N.exe 33 PID 2584 wrote to memory of 1696 2584 5b73c28e57c07f47f8be6f98350f7900N.exe 33 PID 2584 wrote to memory of 1696 2584 5b73c28e57c07f47f8be6f98350f7900N.exe 33 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1836 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b73c28e57c07f47f8be6f98350f7900N.exe"C:\Users\Admin\AppData\Local\Temp\5b73c28e57c07f47f8be6f98350f7900N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\iuyhost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1836
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\5B73C2~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1696
-
-
C:\Windows\Debug\iuyhost.exeC:\Windows\Debug\iuyhost.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5523f6507d7d3866a4bb63400189e3573
SHA129e533d9e6a717d9a643ad73b586ec559e59deec
SHA2569914a6225e439ce4dabb7679ee57128d0f3141c6f68f6e36b3c86a3d561d4e7c
SHA512878e70c102d630a0c458316dd5754adbdcf36766101db680716ea9b6e86dda7a951c965859886872a8038843764165a2527033817ec5557355a747eccdd7cdd3