Analysis
-
max time kernel
149s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 15:39
Static task
static1
Behavioral task
behavioral1
Sample
73783c5cb93ff952d07f5d2d9e992467f32e763e981af2b713a008ffbf9be105.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
73783c5cb93ff952d07f5d2d9e992467f32e763e981af2b713a008ffbf9be105.exe
Resource
win10v2004-20240426-en
General
-
Target
73783c5cb93ff952d07f5d2d9e992467f32e763e981af2b713a008ffbf9be105.exe
-
Size
6.1MB
-
MD5
9f0b2dd262f43cf7f06ac4d210c1fa1a
-
SHA1
d571b518f545a43596bf00f7fa7076ccd65c3a74
-
SHA256
73783c5cb93ff952d07f5d2d9e992467f32e763e981af2b713a008ffbf9be105
-
SHA512
9edeb67dfb1f7a4641e84ab7c8fc20f72c4953db4c3c042d392d6a862af94d8e96eda732d4d1666609dfd866edf12e535e93864174e70c718162bf470003f7cd
-
SSDEEP
98304:w3tlhsoEgXFiVzo7OS4obFPV0igxPMa+DKRcU2jXTrdEWEIqPS23K8ZEMGVcZxsg:InGzAd4EGDPMa5RL2jXSIqP3BCM1Xsg
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation 73783c5cb93ff952d07f5d2d9e992467f32e763e981af2b713a008ffbf9be105.exe -
Executes dropped EXE 1 IoCs
pid Process 4416 SunloginClient.exe -
resource yara_rule behavioral2/files/0x000700000002341d-30.dat upx behavioral2/memory/4416-46-0x0000000000FE0000-0x0000000001F5C000-memory.dmp upx behavioral2/memory/4416-47-0x0000000000FE0000-0x0000000001F5C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2752 73783c5cb93ff952d07f5d2d9e992467f32e763e981af2b713a008ffbf9be105.exe 2752 73783c5cb93ff952d07f5d2d9e992467f32e763e981af2b713a008ffbf9be105.exe 2752 73783c5cb93ff952d07f5d2d9e992467f32e763e981af2b713a008ffbf9be105.exe 2752 73783c5cb93ff952d07f5d2d9e992467f32e763e981af2b713a008ffbf9be105.exe 2752 73783c5cb93ff952d07f5d2d9e992467f32e763e981af2b713a008ffbf9be105.exe 2752 73783c5cb93ff952d07f5d2d9e992467f32e763e981af2b713a008ffbf9be105.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2752 73783c5cb93ff952d07f5d2d9e992467f32e763e981af2b713a008ffbf9be105.exe 2752 73783c5cb93ff952d07f5d2d9e992467f32e763e981af2b713a008ffbf9be105.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2752 wrote to memory of 4416 2752 73783c5cb93ff952d07f5d2d9e992467f32e763e981af2b713a008ffbf9be105.exe 91 PID 2752 wrote to memory of 4416 2752 73783c5cb93ff952d07f5d2d9e992467f32e763e981af2b713a008ffbf9be105.exe 91 PID 2752 wrote to memory of 4416 2752 73783c5cb93ff952d07f5d2d9e992467f32e763e981af2b713a008ffbf9be105.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\73783c5cb93ff952d07f5d2d9e992467f32e763e981af2b713a008ffbf9be105.exe"C:\Users\Admin\AppData\Local\Temp\73783c5cb93ff952d07f5d2d9e992467f32e763e981af2b713a008ffbf9be105.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\SunloginClient.exe"C:\Users\Admin\AppData\Local\Temp\SunloginClient.exe"2⤵
- Executes dropped EXE
PID:4416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30B
MD531bcdb572cba32cb8a87843f02772dfe
SHA18ad63c54f97b4e81183e9f21310e6f5bf99e41f5
SHA256000b764af299d44a169fe3f8b70d5e8b879ff8f42c91c3e50125d207a1b501d7
SHA512f8c05872701069846fa592f88bafa69fb0c482872d2e6eb2e8dcd0111254579c51f84e151030db0b77416e5d277562d9a5233f3e610ab1d49a65c295e4437d4b
-
Filesize
44B
MD5b2241ab8f28e484cc2220cd158aa4acb
SHA1b6d3d81ff57061ba5afdca0825889f552240833a
SHA256ba03b26f37f2f7815339cd65769dc6657bf32a3b10b2ec47051d36f9f5148dbc
SHA512f69d10d074fa2709b7dda0b6354d20359da3bca011825d307409d7f5dacee12a1d2eb3d28dff365c0cf17a252e2c2419d6bab1dff0cf17de0758173101df9fbe
-
Filesize
4.5MB
MD5b8790b98e31919116a1eb817927ca8b2
SHA17a593a558b185cfc15967405cc43449d0fe6980a
SHA256a2c0c9518352763137661073fee5f726217b4bf3b45050a311e9072229bde752
SHA512134e0c69eb77f615bdb4eace483a7b589fafc2d43e80f6b6cdf83ee510cb05eebd545f34aa8caddb1832dc5d0d6b1e09e43a1a00083215be2d5a24359e9619e1