Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 00:29
Static task
static1
Behavioral task
behavioral1
Sample
19607b30214237deda817c52d1ae060e782e8f21c1ab1861623ecbcc791b2901N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
19607b30214237deda817c52d1ae060e782e8f21c1ab1861623ecbcc791b2901N.exe
Resource
win10v2004-20240802-en
General
-
Target
19607b30214237deda817c52d1ae060e782e8f21c1ab1861623ecbcc791b2901N.exe
-
Size
314KB
-
MD5
f17a1354b31a716b76dcf34271aa5410
-
SHA1
4c451d73e05d2021750146e5dae3730a3ce3dbfd
-
SHA256
19607b30214237deda817c52d1ae060e782e8f21c1ab1861623ecbcc791b2901
-
SHA512
48284815f47dc39fb8e65f443b1c0e60b007cadfebae03261d8784955be75725ba38dd49bbfffeac246331e7f8f2a87b8842d59826df2d2ed10f9cc343150e17
-
SSDEEP
3072:FBg8Nu8xX7Ou7GVlTmAt9gMNNy9sEeR7Kw1lmGSKM4hMpCKgCCcxXbsPC35ynqo8:48Nu8QuCV3mGtn2tpCNMflokFnPKg
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 584 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2936 sasup.exe -
Loads dropped DLL 2 IoCs
pid Process 1684 19607b30214237deda817c52d1ae060e782e8f21c1ab1861623ecbcc791b2901N.exe 1684 19607b30214237deda817c52d1ae060e782e8f21c1ab1861623ecbcc791b2901N.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\{D2BEAD48-3C80-AD4F-FE01-FCCCDCDBDFD1} = "C:\\Users\\Admin\\AppData\\Roaming\\Ebveu\\sasup.exe" sasup.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1684 set thread context of 584 1684 19607b30214237deda817c52d1ae060e782e8f21c1ab1861623ecbcc791b2901N.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19607b30214237deda817c52d1ae060e782e8f21c1ab1861623ecbcc791b2901N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sasup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Privacy 19607b30214237deda817c52d1ae060e782e8f21c1ab1861623ecbcc791b2901N.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 19607b30214237deda817c52d1ae060e782e8f21c1ab1861623ecbcc791b2901N.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2936 sasup.exe 2936 sasup.exe 2936 sasup.exe 2936 sasup.exe 2936 sasup.exe 2936 sasup.exe 2936 sasup.exe 2936 sasup.exe 2936 sasup.exe 2936 sasup.exe 2936 sasup.exe 2936 sasup.exe 2936 sasup.exe 2936 sasup.exe 2936 sasup.exe 2936 sasup.exe 2936 sasup.exe 2936 sasup.exe 2936 sasup.exe 2936 sasup.exe 2936 sasup.exe 2936 sasup.exe 2936 sasup.exe 2936 sasup.exe 2936 sasup.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1684 19607b30214237deda817c52d1ae060e782e8f21c1ab1861623ecbcc791b2901N.exe 2936 sasup.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2936 1684 19607b30214237deda817c52d1ae060e782e8f21c1ab1861623ecbcc791b2901N.exe 28 PID 1684 wrote to memory of 2936 1684 19607b30214237deda817c52d1ae060e782e8f21c1ab1861623ecbcc791b2901N.exe 28 PID 1684 wrote to memory of 2936 1684 19607b30214237deda817c52d1ae060e782e8f21c1ab1861623ecbcc791b2901N.exe 28 PID 1684 wrote to memory of 2936 1684 19607b30214237deda817c52d1ae060e782e8f21c1ab1861623ecbcc791b2901N.exe 28 PID 2936 wrote to memory of 1120 2936 sasup.exe 19 PID 2936 wrote to memory of 1120 2936 sasup.exe 19 PID 2936 wrote to memory of 1120 2936 sasup.exe 19 PID 2936 wrote to memory of 1120 2936 sasup.exe 19 PID 2936 wrote to memory of 1120 2936 sasup.exe 19 PID 2936 wrote to memory of 1164 2936 sasup.exe 20 PID 2936 wrote to memory of 1164 2936 sasup.exe 20 PID 2936 wrote to memory of 1164 2936 sasup.exe 20 PID 2936 wrote to memory of 1164 2936 sasup.exe 20 PID 2936 wrote to memory of 1164 2936 sasup.exe 20 PID 2936 wrote to memory of 1200 2936 sasup.exe 21 PID 2936 wrote to memory of 1200 2936 sasup.exe 21 PID 2936 wrote to memory of 1200 2936 sasup.exe 21 PID 2936 wrote to memory of 1200 2936 sasup.exe 21 PID 2936 wrote to memory of 1200 2936 sasup.exe 21 PID 2936 wrote to memory of 1624 2936 sasup.exe 23 PID 2936 wrote to memory of 1624 2936 sasup.exe 23 PID 2936 wrote to memory of 1624 2936 sasup.exe 23 PID 2936 wrote to memory of 1624 2936 sasup.exe 23 PID 2936 wrote to memory of 1624 2936 sasup.exe 23 PID 2936 wrote to memory of 1684 2936 sasup.exe 27 PID 2936 wrote to memory of 1684 2936 sasup.exe 27 PID 2936 wrote to memory of 1684 2936 sasup.exe 27 PID 2936 wrote to memory of 1684 2936 sasup.exe 27 PID 2936 wrote to memory of 1684 2936 sasup.exe 27 PID 1684 wrote to memory of 584 1684 19607b30214237deda817c52d1ae060e782e8f21c1ab1861623ecbcc791b2901N.exe 29 PID 1684 wrote to memory of 584 1684 19607b30214237deda817c52d1ae060e782e8f21c1ab1861623ecbcc791b2901N.exe 29 PID 1684 wrote to memory of 584 1684 19607b30214237deda817c52d1ae060e782e8f21c1ab1861623ecbcc791b2901N.exe 29 PID 1684 wrote to memory of 584 1684 19607b30214237deda817c52d1ae060e782e8f21c1ab1861623ecbcc791b2901N.exe 29 PID 1684 wrote to memory of 584 1684 19607b30214237deda817c52d1ae060e782e8f21c1ab1861623ecbcc791b2901N.exe 29 PID 1684 wrote to memory of 584 1684 19607b30214237deda817c52d1ae060e782e8f21c1ab1861623ecbcc791b2901N.exe 29 PID 1684 wrote to memory of 584 1684 19607b30214237deda817c52d1ae060e782e8f21c1ab1861623ecbcc791b2901N.exe 29 PID 1684 wrote to memory of 584 1684 19607b30214237deda817c52d1ae060e782e8f21c1ab1861623ecbcc791b2901N.exe 29 PID 1684 wrote to memory of 584 1684 19607b30214237deda817c52d1ae060e782e8f21c1ab1861623ecbcc791b2901N.exe 29
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1164
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\19607b30214237deda817c52d1ae060e782e8f21c1ab1861623ecbcc791b2901N.exe"C:\Users\Admin\AppData\Local\Temp\19607b30214237deda817c52d1ae060e782e8f21c1ab1861623ecbcc791b2901N.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Roaming\Ebveu\sasup.exe"C:\Users\Admin\AppData\Roaming\Ebveu\sasup.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2936
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp805cb30d.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:584
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
309B
MD5692b856a6eb44eaa7d251047c6a11862
SHA155f0a43ba43dc8bd7f144f0570b5c3c166ecf9b1
SHA25642bab79464f216d6d6dd1327cbc1089346ec6534866fe9637af1c38a2712e354
SHA512040112c7328eab3fd9a66b5baa4974aba1b5411476ab79aa23d31512d1bba496aa0cfc4bd7a0fabd558e141a1e21ef172f8ca0309d872879b4348a4c6f298d19
-
Filesize
314KB
MD59e5e147572732f62c31e89f11ecff747
SHA18966c1d7ac44f302a0715b4d9fd5833572bbb5b3
SHA25600187c97136472c20746ae92399f9aa01e4afa38974387cd119227a6d0e20fdd
SHA512f9084beb38d0ef59412f2ee7534b4870c3d8706476a82e04282aef02dc80961175194aa59d192290a54d5f74affbfbc4c4399516162bb377b014cccf59f2a89a