Analysis
-
max time kernel
189s -
max time network
234s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 17:11
Static task
static1
Behavioral task
behavioral1
Sample
d1b676548d0e0d3033a36f74ec7c65f23a3729529dda4eea9b84cde9840d9479.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d1b676548d0e0d3033a36f74ec7c65f23a3729529dda4eea9b84cde9840d9479.exe
Resource
win10v2004-20221111-en
General
-
Target
d1b676548d0e0d3033a36f74ec7c65f23a3729529dda4eea9b84cde9840d9479.exe
-
Size
377KB
-
MD5
e31a72a2969441513d6fd427d365eaba
-
SHA1
304a3aada3eed99e1f1790713a41fcd69590fc94
-
SHA256
d1b676548d0e0d3033a36f74ec7c65f23a3729529dda4eea9b84cde9840d9479
-
SHA512
cbbb815208298e6a7b8782fb48630ba3fa3240bc708fbee8ba298de776b3bd355e13cdf375f5f6f746f199521fcc2e50f5cf57d36c371f19d5643fd145e893bf
-
SSDEEP
6144:gs1dB7c9VzrA98jUxh5R8WyPDh/S5PE6KRnhJRSkJpuuuuuuuuuuuuuuuuuuuuue:gZnA98wh7aPDha5P+fpuuuuuuuuuuuuN
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1036 suor.exe -
Deletes itself 1 IoCs
pid Process 840 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1412 d1b676548d0e0d3033a36f74ec7c65f23a3729529dda4eea9b84cde9840d9479.exe 1412 d1b676548d0e0d3033a36f74ec7c65f23a3729529dda4eea9b84cde9840d9479.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\Currentversion\Run suor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\{A87A45C8-3774-AD4D-8524-3978BFBA1A65} = "C:\\Users\\Admin\\AppData\\Roaming\\Iqoj\\suor.exe" suor.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1412 set thread context of 840 1412 d1b676548d0e0d3033a36f74ec7c65f23a3729529dda4eea9b84cde9840d9479.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Privacy d1b676548d0e0d3033a36f74ec7c65f23a3729529dda4eea9b84cde9840d9479.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" d1b676548d0e0d3033a36f74ec7c65f23a3729529dda4eea9b84cde9840d9479.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 1036 suor.exe 1036 suor.exe 1036 suor.exe 1036 suor.exe 1036 suor.exe 1036 suor.exe 1036 suor.exe 1036 suor.exe 1036 suor.exe 1036 suor.exe 1036 suor.exe 1036 suor.exe 1036 suor.exe 1036 suor.exe 1036 suor.exe 1036 suor.exe 1036 suor.exe 1036 suor.exe 1036 suor.exe 1036 suor.exe 1036 suor.exe 1036 suor.exe 1036 suor.exe 1036 suor.exe 1036 suor.exe 1036 suor.exe 1036 suor.exe 1036 suor.exe 1036 suor.exe 1036 suor.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 1412 wrote to memory of 1036 1412 d1b676548d0e0d3033a36f74ec7c65f23a3729529dda4eea9b84cde9840d9479.exe 28 PID 1412 wrote to memory of 1036 1412 d1b676548d0e0d3033a36f74ec7c65f23a3729529dda4eea9b84cde9840d9479.exe 28 PID 1412 wrote to memory of 1036 1412 d1b676548d0e0d3033a36f74ec7c65f23a3729529dda4eea9b84cde9840d9479.exe 28 PID 1412 wrote to memory of 1036 1412 d1b676548d0e0d3033a36f74ec7c65f23a3729529dda4eea9b84cde9840d9479.exe 28 PID 1036 wrote to memory of 1148 1036 suor.exe 15 PID 1036 wrote to memory of 1148 1036 suor.exe 15 PID 1036 wrote to memory of 1148 1036 suor.exe 15 PID 1036 wrote to memory of 1148 1036 suor.exe 15 PID 1036 wrote to memory of 1148 1036 suor.exe 15 PID 1036 wrote to memory of 1236 1036 suor.exe 14 PID 1036 wrote to memory of 1236 1036 suor.exe 14 PID 1036 wrote to memory of 1236 1036 suor.exe 14 PID 1036 wrote to memory of 1236 1036 suor.exe 14 PID 1036 wrote to memory of 1236 1036 suor.exe 14 PID 1036 wrote to memory of 1272 1036 suor.exe 13 PID 1036 wrote to memory of 1272 1036 suor.exe 13 PID 1036 wrote to memory of 1272 1036 suor.exe 13 PID 1036 wrote to memory of 1272 1036 suor.exe 13 PID 1036 wrote to memory of 1272 1036 suor.exe 13 PID 1036 wrote to memory of 1412 1036 suor.exe 20 PID 1036 wrote to memory of 1412 1036 suor.exe 20 PID 1036 wrote to memory of 1412 1036 suor.exe 20 PID 1036 wrote to memory of 1412 1036 suor.exe 20 PID 1036 wrote to memory of 1412 1036 suor.exe 20 PID 1412 wrote to memory of 840 1412 d1b676548d0e0d3033a36f74ec7c65f23a3729529dda4eea9b84cde9840d9479.exe 29 PID 1412 wrote to memory of 840 1412 d1b676548d0e0d3033a36f74ec7c65f23a3729529dda4eea9b84cde9840d9479.exe 29 PID 1412 wrote to memory of 840 1412 d1b676548d0e0d3033a36f74ec7c65f23a3729529dda4eea9b84cde9840d9479.exe 29 PID 1412 wrote to memory of 840 1412 d1b676548d0e0d3033a36f74ec7c65f23a3729529dda4eea9b84cde9840d9479.exe 29 PID 1412 wrote to memory of 840 1412 d1b676548d0e0d3033a36f74ec7c65f23a3729529dda4eea9b84cde9840d9479.exe 29 PID 1412 wrote to memory of 840 1412 d1b676548d0e0d3033a36f74ec7c65f23a3729529dda4eea9b84cde9840d9479.exe 29 PID 1412 wrote to memory of 840 1412 d1b676548d0e0d3033a36f74ec7c65f23a3729529dda4eea9b84cde9840d9479.exe 29 PID 1412 wrote to memory of 840 1412 d1b676548d0e0d3033a36f74ec7c65f23a3729529dda4eea9b84cde9840d9479.exe 29 PID 1412 wrote to memory of 840 1412 d1b676548d0e0d3033a36f74ec7c65f23a3729529dda4eea9b84cde9840d9479.exe 29 PID 1036 wrote to memory of 1212 1036 suor.exe 31 PID 1036 wrote to memory of 1212 1036 suor.exe 31 PID 1036 wrote to memory of 1212 1036 suor.exe 31 PID 1036 wrote to memory of 1212 1036 suor.exe 31 PID 1036 wrote to memory of 1212 1036 suor.exe 31 PID 1036 wrote to memory of 1712 1036 suor.exe 32 PID 1036 wrote to memory of 1712 1036 suor.exe 32 PID 1036 wrote to memory of 1712 1036 suor.exe 32 PID 1036 wrote to memory of 1712 1036 suor.exe 32 PID 1036 wrote to memory of 1712 1036 suor.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\d1b676548d0e0d3033a36f74ec7c65f23a3729529dda4eea9b84cde9840d9479.exe"C:\Users\Admin\AppData\Local\Temp\d1b676548d0e0d3033a36f74ec7c65f23a3729529dda4eea9b84cde9840d9479.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Roaming\Iqoj\suor.exe"C:\Users\Admin\AppData\Roaming\Iqoj\suor.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1036
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp5cd578cb.bat"3⤵
- Deletes itself
PID:840
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1236
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1148
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1212
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1712
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5ce96273e3b8a92ede3be07e29b25191f
SHA15e04fc9a4694b9b10e976285cfe8bffa02a89d9d
SHA256317572b5fa58d7cc47039f025193473ad41a7ba7c23cc71903ae9cbf943ee2c5
SHA51235c9a88af8aafcb038211b8a24e82f1b24373f0ce75d08c01ee6a80afac1268ab644bfb28436c2a670c74c6452325af43b291df03b888a8a7a805f0a7c4c778c
-
Filesize
377KB
MD5c08db8223bb9d31163ede1ec8859d25b
SHA1f66253b878bdf64711d50604cf48c161e37a9e4a
SHA256058f25d6812f8e6390de8215af54106f48541ed0db0734cf09b23b962d1a7569
SHA512fa9431bc6dc805f1f7a5e4a206187c9552c5583166b32f58ce39200767227f5f23bff2bd8d2508af4d72bb6c0516d9d658c2b66f861c109d1d1d3ea3c45a3720
-
Filesize
377KB
MD5c08db8223bb9d31163ede1ec8859d25b
SHA1f66253b878bdf64711d50604cf48c161e37a9e4a
SHA256058f25d6812f8e6390de8215af54106f48541ed0db0734cf09b23b962d1a7569
SHA512fa9431bc6dc805f1f7a5e4a206187c9552c5583166b32f58ce39200767227f5f23bff2bd8d2508af4d72bb6c0516d9d658c2b66f861c109d1d1d3ea3c45a3720
-
Filesize
377KB
MD5c08db8223bb9d31163ede1ec8859d25b
SHA1f66253b878bdf64711d50604cf48c161e37a9e4a
SHA256058f25d6812f8e6390de8215af54106f48541ed0db0734cf09b23b962d1a7569
SHA512fa9431bc6dc805f1f7a5e4a206187c9552c5583166b32f58ce39200767227f5f23bff2bd8d2508af4d72bb6c0516d9d658c2b66f861c109d1d1d3ea3c45a3720
-
Filesize
377KB
MD5c08db8223bb9d31163ede1ec8859d25b
SHA1f66253b878bdf64711d50604cf48c161e37a9e4a
SHA256058f25d6812f8e6390de8215af54106f48541ed0db0734cf09b23b962d1a7569
SHA512fa9431bc6dc805f1f7a5e4a206187c9552c5583166b32f58ce39200767227f5f23bff2bd8d2508af4d72bb6c0516d9d658c2b66f861c109d1d1d3ea3c45a3720