Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 01:18
Static task
static1
Behavioral task
behavioral1
Sample
551835cba9b3ff9ca2ef016a73bdec4c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
551835cba9b3ff9ca2ef016a73bdec4c.exe
Resource
win10v2004-20231222-en
General
-
Target
551835cba9b3ff9ca2ef016a73bdec4c.exe
-
Size
116KB
-
MD5
551835cba9b3ff9ca2ef016a73bdec4c
-
SHA1
74139441bb83f5575a3717354287774223265cef
-
SHA256
53ff5c88b101db186d623d96b7d85495868cc272729cc9c005fd42a6e262379b
-
SHA512
e2f8361e78df397ce23985ea3cfa00a644e2692f3858fae8d5a329495b356265e834ca4af670b46c1543ea3ef4391be95d83267c9b5cfd425d93803ad30241c4
-
SSDEEP
3072:4v7777777777777777V7777777777777777777LL30N:E3S
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 551835cba9b3ff9ca2ef016a73bdec4c.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" seuwi.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 551835cba9b3ff9ca2ef016a73bdec4c.exe -
Executes dropped EXE 1 IoCs
pid Process 3036 seuwi.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuwi = "C:\\Users\\Admin\\seuwi.exe /o" seuwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuwi = "C:\\Users\\Admin\\seuwi.exe /u" seuwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuwi = "C:\\Users\\Admin\\seuwi.exe /g" seuwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuwi = "C:\\Users\\Admin\\seuwi.exe /h" seuwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuwi = "C:\\Users\\Admin\\seuwi.exe /p" seuwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuwi = "C:\\Users\\Admin\\seuwi.exe /e" seuwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuwi = "C:\\Users\\Admin\\seuwi.exe /z" seuwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuwi = "C:\\Users\\Admin\\seuwi.exe /l" seuwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuwi = "C:\\Users\\Admin\\seuwi.exe /t" 551835cba9b3ff9ca2ef016a73bdec4c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuwi = "C:\\Users\\Admin\\seuwi.exe /a" seuwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuwi = "C:\\Users\\Admin\\seuwi.exe /s" seuwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuwi = "C:\\Users\\Admin\\seuwi.exe /w" seuwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuwi = "C:\\Users\\Admin\\seuwi.exe /c" seuwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuwi = "C:\\Users\\Admin\\seuwi.exe /i" seuwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuwi = "C:\\Users\\Admin\\seuwi.exe /f" seuwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuwi = "C:\\Users\\Admin\\seuwi.exe /k" seuwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuwi = "C:\\Users\\Admin\\seuwi.exe /n" seuwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuwi = "C:\\Users\\Admin\\seuwi.exe /q" seuwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuwi = "C:\\Users\\Admin\\seuwi.exe /v" seuwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuwi = "C:\\Users\\Admin\\seuwi.exe /j" seuwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuwi = "C:\\Users\\Admin\\seuwi.exe /t" seuwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuwi = "C:\\Users\\Admin\\seuwi.exe /r" seuwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuwi = "C:\\Users\\Admin\\seuwi.exe /m" seuwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuwi = "C:\\Users\\Admin\\seuwi.exe /d" seuwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuwi = "C:\\Users\\Admin\\seuwi.exe /y" seuwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuwi = "C:\\Users\\Admin\\seuwi.exe /x" seuwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuwi = "C:\\Users\\Admin\\seuwi.exe /b" seuwi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5052 551835cba9b3ff9ca2ef016a73bdec4c.exe 5052 551835cba9b3ff9ca2ef016a73bdec4c.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe 3036 seuwi.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5052 551835cba9b3ff9ca2ef016a73bdec4c.exe 3036 seuwi.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5052 wrote to memory of 3036 5052 551835cba9b3ff9ca2ef016a73bdec4c.exe 96 PID 5052 wrote to memory of 3036 5052 551835cba9b3ff9ca2ef016a73bdec4c.exe 96 PID 5052 wrote to memory of 3036 5052 551835cba9b3ff9ca2ef016a73bdec4c.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\551835cba9b3ff9ca2ef016a73bdec4c.exe"C:\Users\Admin\AppData\Local\Temp\551835cba9b3ff9ca2ef016a73bdec4c.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\seuwi.exe"C:\Users\Admin\seuwi.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD578557975fa193135835ed44a7e5bf475
SHA1736df06dd6c80c5b50cfc88c64210fcdb3659e11
SHA256172d638a03f82a4c62a7ea00fb00056b6213342aa09ec0290ab35e0dbe234108
SHA51277e9100be6856d0630387f86377cbb8a27c23d826dc72479fae7e22a3410c2b1a47e5c53f57c206f89f73869491c634b16f2eee8e3f4d394f21a9d69948bc1a1