Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 21:44
Static task
static1
Behavioral task
behavioral1
Sample
1eed8983752d58c4b1935127dec616c0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
1eed8983752d58c4b1935127dec616c0N.exe
Resource
win10v2004-20240802-en
General
-
Target
1eed8983752d58c4b1935127dec616c0N.exe
-
Size
47KB
-
MD5
1eed8983752d58c4b1935127dec616c0
-
SHA1
b58d2d6aa08dc7a954b6f4e491d07aab4f0cb8ef
-
SHA256
903e4088c4a275c256513058232c62b6385d07d37c5d97ecbeb8163c205897bb
-
SHA512
e5373d0af11ecf4a3c7daa5109c4ccdc0df463e6431e521f0faa151abb8abfef2638bea7ecdf3d15c0eafab7cde03fc4cb3803e757e4a4522550a33acb980982
-
SSDEEP
768:xWRR4LiBiapyJJ+2ZXUFGtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZsBGWlk4G:x0aiBzpzOXvtdgI2MyzNORQtOflIwoHH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2016 suip.exe -
Loads dropped DLL 1 IoCs
pid Process 2156 1eed8983752d58c4b1935127dec616c0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1eed8983752d58c4b1935127dec616c0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language suip.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2156 1eed8983752d58c4b1935127dec616c0N.exe 2016 suip.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2016 2156 1eed8983752d58c4b1935127dec616c0N.exe 30 PID 2156 wrote to memory of 2016 2156 1eed8983752d58c4b1935127dec616c0N.exe 30 PID 2156 wrote to memory of 2016 2156 1eed8983752d58c4b1935127dec616c0N.exe 30 PID 2156 wrote to memory of 2016 2156 1eed8983752d58c4b1935127dec616c0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1eed8983752d58c4b1935127dec616c0N.exe"C:\Users\Admin\AppData\Local\Temp\1eed8983752d58c4b1935127dec616c0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\suip.exe"C:\Users\Admin\AppData\Local\Temp\suip.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD545426506cb4ad721b9e117b65b624351
SHA115cd7a9802923f9d49878ea5e7eccd3035badc7d
SHA25650082433a5462e27eb95714f296e2acf1a377961e406cda5f0b2a33ddfe509cb
SHA512ff062980851bb05f2157b08f89d9157b69f8c4ef758ffa763fb337afb8cbc88939901c096ce2d6b8a62b9262ff929cd9d5a9bcb6fa59bf128f2bed8b6bdd1b05