Analysis
-
max time kernel
155s -
max time network
189s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 07:52
Static task
static1
Behavioral task
behavioral1
Sample
88f12ab73ac0ec94682e626ad062c769df495ad930ef36598cb7041a41c59722.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
88f12ab73ac0ec94682e626ad062c769df495ad930ef36598cb7041a41c59722.exe
Resource
win10v2004-20221111-en
General
-
Target
88f12ab73ac0ec94682e626ad062c769df495ad930ef36598cb7041a41c59722.exe
-
Size
310KB
-
MD5
0391ceef86887edadca057904b588570
-
SHA1
ef07326b600dfa8112a33393b8b720270927a205
-
SHA256
88f12ab73ac0ec94682e626ad062c769df495ad930ef36598cb7041a41c59722
-
SHA512
1d997968732c28f6f525a6536baffd3c94bc6a9ba8165ac5aa666fb8e309935af81c5d04b27fab174984509d9a62ad767bdb54862274bd6fc02dc4adb3412f5e
-
SSDEEP
6144:WcvltKea0aKaeOwwZmzP7KUo95beRE9/1pRM6GetqUxaG:WcThbvSmb7Bo95be43RM6GeIUX
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1120 siuda.exe -
Deletes itself 1 IoCs
pid Process 1636 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1724 88f12ab73ac0ec94682e626ad062c769df495ad930ef36598cb7041a41c59722.exe 1724 88f12ab73ac0ec94682e626ad062c769df495ad930ef36598cb7041a41c59722.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run siuda.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\Siuda = "C:\\Users\\Admin\\AppData\\Roaming\\Fozij\\siuda.exe" siuda.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1724 set thread context of 1636 1724 88f12ab73ac0ec94682e626ad062c769df495ad930ef36598cb7041a41c59722.exe 28 -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 1120 siuda.exe 1120 siuda.exe 1120 siuda.exe 1120 siuda.exe 1120 siuda.exe 1120 siuda.exe 1120 siuda.exe 1120 siuda.exe 1120 siuda.exe 1120 siuda.exe 1120 siuda.exe 1120 siuda.exe 1120 siuda.exe 1120 siuda.exe 1120 siuda.exe 1120 siuda.exe 1120 siuda.exe 1120 siuda.exe 1120 siuda.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1120 1724 88f12ab73ac0ec94682e626ad062c769df495ad930ef36598cb7041a41c59722.exe 27 PID 1724 wrote to memory of 1120 1724 88f12ab73ac0ec94682e626ad062c769df495ad930ef36598cb7041a41c59722.exe 27 PID 1724 wrote to memory of 1120 1724 88f12ab73ac0ec94682e626ad062c769df495ad930ef36598cb7041a41c59722.exe 27 PID 1724 wrote to memory of 1120 1724 88f12ab73ac0ec94682e626ad062c769df495ad930ef36598cb7041a41c59722.exe 27 PID 1120 wrote to memory of 1124 1120 siuda.exe 17 PID 1120 wrote to memory of 1124 1120 siuda.exe 17 PID 1120 wrote to memory of 1124 1120 siuda.exe 17 PID 1120 wrote to memory of 1124 1120 siuda.exe 17 PID 1120 wrote to memory of 1124 1120 siuda.exe 17 PID 1120 wrote to memory of 1176 1120 siuda.exe 16 PID 1120 wrote to memory of 1176 1120 siuda.exe 16 PID 1120 wrote to memory of 1176 1120 siuda.exe 16 PID 1120 wrote to memory of 1176 1120 siuda.exe 16 PID 1120 wrote to memory of 1176 1120 siuda.exe 16 PID 1120 wrote to memory of 1264 1120 siuda.exe 15 PID 1120 wrote to memory of 1264 1120 siuda.exe 15 PID 1120 wrote to memory of 1264 1120 siuda.exe 15 PID 1120 wrote to memory of 1264 1120 siuda.exe 15 PID 1120 wrote to memory of 1264 1120 siuda.exe 15 PID 1120 wrote to memory of 1724 1120 siuda.exe 18 PID 1120 wrote to memory of 1724 1120 siuda.exe 18 PID 1120 wrote to memory of 1724 1120 siuda.exe 18 PID 1120 wrote to memory of 1724 1120 siuda.exe 18 PID 1120 wrote to memory of 1724 1120 siuda.exe 18 PID 1724 wrote to memory of 1636 1724 88f12ab73ac0ec94682e626ad062c769df495ad930ef36598cb7041a41c59722.exe 28 PID 1724 wrote to memory of 1636 1724 88f12ab73ac0ec94682e626ad062c769df495ad930ef36598cb7041a41c59722.exe 28 PID 1724 wrote to memory of 1636 1724 88f12ab73ac0ec94682e626ad062c769df495ad930ef36598cb7041a41c59722.exe 28 PID 1724 wrote to memory of 1636 1724 88f12ab73ac0ec94682e626ad062c769df495ad930ef36598cb7041a41c59722.exe 28 PID 1724 wrote to memory of 1636 1724 88f12ab73ac0ec94682e626ad062c769df495ad930ef36598cb7041a41c59722.exe 28 PID 1724 wrote to memory of 1636 1724 88f12ab73ac0ec94682e626ad062c769df495ad930ef36598cb7041a41c59722.exe 28 PID 1724 wrote to memory of 1636 1724 88f12ab73ac0ec94682e626ad062c769df495ad930ef36598cb7041a41c59722.exe 28 PID 1724 wrote to memory of 1636 1724 88f12ab73ac0ec94682e626ad062c769df495ad930ef36598cb7041a41c59722.exe 28 PID 1724 wrote to memory of 1636 1724 88f12ab73ac0ec94682e626ad062c769df495ad930ef36598cb7041a41c59722.exe 28
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\88f12ab73ac0ec94682e626ad062c769df495ad930ef36598cb7041a41c59722.exe"C:\Users\Admin\AppData\Local\Temp\88f12ab73ac0ec94682e626ad062c769df495ad930ef36598cb7041a41c59722.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Roaming\Fozij\siuda.exe"C:\Users\Admin\AppData\Roaming\Fozij\siuda.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1120
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\IRT44F4.bat"3⤵
- Deletes itself
PID:1636
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1124
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303B
MD5f23a267a01a7d11251d6697ab6872b13
SHA1a1ff2d169264fb0c69a91f3977f814314424210f
SHA256c60c97bee7cb3c314b0af944506b08e7d7cc3bbbe2d0d86201131936ebe74a53
SHA512a33b4bc23b5d075f30b8b580c6815eb5a4d6d1393945614564c7a1f94415563d90326bed3c1e128189f7f6df15a0df960f69a452a17e30a52f1c3e4250f59a4a
-
Filesize
310KB
MD524c9b38d66dcd475df9b7c084e504878
SHA18d9e9ea9a2c1469ade83635b9e95ddefd4da6c19
SHA2562b21c1c185200ec046b794137806fff0c69d5af2bfd19af5f94f68f8c666818e
SHA5122f43ed8aa2da3030e076f6cd65368023f8fe4d41065e5eba84fb0297c0def2b5f313b27ca33d287a465b55acaa65f7a6da82c68a3b22816e25560da27356cc73
-
Filesize
310KB
MD524c9b38d66dcd475df9b7c084e504878
SHA18d9e9ea9a2c1469ade83635b9e95ddefd4da6c19
SHA2562b21c1c185200ec046b794137806fff0c69d5af2bfd19af5f94f68f8c666818e
SHA5122f43ed8aa2da3030e076f6cd65368023f8fe4d41065e5eba84fb0297c0def2b5f313b27ca33d287a465b55acaa65f7a6da82c68a3b22816e25560da27356cc73
-
Filesize
310KB
MD524c9b38d66dcd475df9b7c084e504878
SHA18d9e9ea9a2c1469ade83635b9e95ddefd4da6c19
SHA2562b21c1c185200ec046b794137806fff0c69d5af2bfd19af5f94f68f8c666818e
SHA5122f43ed8aa2da3030e076f6cd65368023f8fe4d41065e5eba84fb0297c0def2b5f313b27ca33d287a465b55acaa65f7a6da82c68a3b22816e25560da27356cc73
-
Filesize
310KB
MD524c9b38d66dcd475df9b7c084e504878
SHA18d9e9ea9a2c1469ade83635b9e95ddefd4da6c19
SHA2562b21c1c185200ec046b794137806fff0c69d5af2bfd19af5f94f68f8c666818e
SHA5122f43ed8aa2da3030e076f6cd65368023f8fe4d41065e5eba84fb0297c0def2b5f313b27ca33d287a465b55acaa65f7a6da82c68a3b22816e25560da27356cc73