Overview
overview
10Static
static
3Chams Sudd...rs.exe
windows7-x64
10Chams Sudd...rs.exe
windows10-2004-x64
10Chams Sudd...no.dll
windows7-x64
3Chams Sudd...no.dll
windows10-2004-x64
3Perx Wall ...ed.exe
windows7-x64
3Perx Wall ...ed.exe
windows10-2004-x64
3Perx Wall ...no.dll
windows7-x64
3Perx Wall ...no.dll
windows10-2004-x64
3Siyanur la...ck.exe
windows7-x64
7Siyanur la...ck.exe
windows10-2004-x64
7Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 13:15
Static task
static1
Behavioral task
behavioral1
Sample
Chams Sudden + Mado,s Injectors/Mado,s Injectors.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Chams Sudden + Mado,s Injectors/Mado,s Injectors.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Chams Sudden + Mado_s Injectors/UPDATE Chams Sudden Latino.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Chams Sudden + Mado_s Injectors/UPDATE Chams Sudden Latino.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Perx Wall hack S.ALatino/Perx Updated.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Perx Wall hack S.ALatino/Perx Updated.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Perx Wall hack S.ALatino/UPDATE Chams Sudden Latino.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
Perx Wall hack S.ALatino/UPDATE Chams Sudden Latino.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Siyanur lag hack- S.A latino/siyanur - Lag Hack.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Siyanur lag hack- S.A latino/siyanur - Lag Hack.exe
Resource
win10v2004-20241007-en
General
-
Target
Siyanur lag hack- S.A latino/siyanur - Lag Hack.exe
-
Size
777KB
-
MD5
91c8a2597dfaa6acd74e3e36aad13795
-
SHA1
6eecfee76e50c1386d5e2ace2d854b36e772f39e
-
SHA256
6579041d87f55e77a82942f943ecee122555a40f0bc93be4614cf024b87f1cf1
-
SHA512
bba3004e251eeeed049a656746fe3e915e46953f46078cefd18bb79a7dd04f81155f4396e3bb07ae99523ac4fa99386255e378eeee997550bc875004c7a1c7ab
-
SSDEEP
24576:5naVMJ3TWq+OxymwoglBMazrEdr6kS3rJQBtUkBgJ:5amJjyOwmwoMFqrSinXBgJ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
siyanur - Lag Hack.tmpsnetcfg.exepid process 4484 siyanur - Lag Hack.tmp 316 snetcfg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 8 IoCs
Processes:
siyanur - Lag Hack.tmpDrvInst.exedescription ioc process File created C:\Windows\system32\is-DDIG2.tmp siyanur - Lag Hack.tmp File opened for modification C:\Windows\System32\DriverStore\Temp\{d0bea4e4-86d7-5f4d-a78e-e0b0bd8be3f4}\SETE61A.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{d0bea4e4-86d7-5f4d-a78e-e0b0bd8be3f4}\SETE61A.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{d0bea4e4-86d7-5f4d-a78e-e0b0bd8be3f4}\spfdrv.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{d0bea4e4-86d7-5f4d-a78e-e0b0bd8be3f4}\SETE62B.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{d0bea4e4-86d7-5f4d-a78e-e0b0bd8be3f4}\SETE62B.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{d0bea4e4-86d7-5f4d-a78e-e0b0bd8be3f4}\spfdrv.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{d0bea4e4-86d7-5f4d-a78e-e0b0bd8be3f4} DrvInst.exe -
Drops file in Program Files directory 11 IoCs
Processes:
siyanur - Lag Hack.tmpdescription ioc process File created C:\Program Files\Siyanur\is-CADB3.tmp siyanur - Lag Hack.tmp File created C:\Program Files\Siyanur\is-04F5J.tmp siyanur - Lag Hack.tmp File created C:\Program Files\Siyanur\unins000.dat siyanur - Lag Hack.tmp File created C:\Program Files\Siyanur\is-G8MUC.tmp siyanur - Lag Hack.tmp File created C:\Program Files\Siyanur\is-CE7HO.tmp siyanur - Lag Hack.tmp File created C:\Program Files\Siyanur\is-ICH8F.tmp siyanur - Lag Hack.tmp File created C:\Program Files\Siyanur\is-P1C1A.tmp siyanur - Lag Hack.tmp File created C:\Program Files\Siyanur\is-CBD1P.tmp siyanur - Lag Hack.tmp File opened for modification C:\Program Files\Siyanur\unins000.dat siyanur - Lag Hack.tmp File created C:\Program Files\Siyanur\is-SBAI6.tmp siyanur - Lag Hack.tmp File created C:\Program Files\Siyanur\is-0F3FM.tmp siyanur - Lag Hack.tmp -
Drops file in Windows directory 3 IoCs
Processes:
DrvInst.exesnetcfg.exesvchost.exedescription ioc process File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log snetcfg.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
siyanur - Lag Hack.tmpsiyanur - Lag Hack.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language siyanur - Lag Hack.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language siyanur - Lag Hack.exe -
Checks SCSI registry key(s) 3 TTPs 10 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
svchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
svchost.exedescription pid process Token: SeAuditPrivilege 3956 svchost.exe Token: SeSecurityPrivilege 3956 svchost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
siyanur - Lag Hack.tmppid process 4484 siyanur - Lag Hack.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
siyanur - Lag Hack.exesiyanur - Lag Hack.tmpsvchost.exedescription pid process target process PID 5108 wrote to memory of 4484 5108 siyanur - Lag Hack.exe siyanur - Lag Hack.tmp PID 5108 wrote to memory of 4484 5108 siyanur - Lag Hack.exe siyanur - Lag Hack.tmp PID 5108 wrote to memory of 4484 5108 siyanur - Lag Hack.exe siyanur - Lag Hack.tmp PID 4484 wrote to memory of 316 4484 siyanur - Lag Hack.tmp snetcfg.exe PID 4484 wrote to memory of 316 4484 siyanur - Lag Hack.tmp snetcfg.exe PID 3956 wrote to memory of 3136 3956 svchost.exe DrvInst.exe PID 3956 wrote to memory of 3136 3956 svchost.exe DrvInst.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Siyanur lag hack- S.A latino\siyanur - Lag Hack.exe"C:\Users\Admin\AppData\Local\Temp\Siyanur lag hack- S.A latino\siyanur - Lag Hack.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\is-JFG64.tmp\siyanur - Lag Hack.tmp"C:\Users\Admin\AppData\Local\Temp\is-JFG64.tmp\siyanur - Lag Hack.tmp" /SL5="$501D4,552640,54272,C:\Users\Admin\AppData\Local\Temp\Siyanur lag hack- S.A latino\siyanur - Lag Hack.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Program Files\Siyanur\snetcfg.exe"C:\Program Files\Siyanur\snetcfg.exe" -v -l spfdrv.inf -m spfdrv_m.inf -c s -i nt_spfdrv3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:316
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{aacee30a-6942-3a43-ae4a-ccb0eeabe850}\spfdrv.inf" "9" "4e2cd0677" "0000000000000154" "WinSta0\Default" "0000000000000158" "208" "C:\Program Files\Siyanur"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:3136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD520c4cd6e8536974333b42b87670edc72
SHA1367ba1d78d578c5d76b2ab610ed0a74b4d43b958
SHA256853c150960d267159a5b35692c66cabfb84a07ccd928ad3c7abd355f1c7751ff
SHA51239493bb0f8c12f350ae8b3d3126becd15d143a4d7d8331254d28f43a5b9637058ca0e2472331c0198d7b78229d7b5eedfdc6d1feca41d843410e020e4fc4db5a
-
Filesize
15KB
MD569caec3264ee2470fbe9f931e46c9004
SHA10abb876471eb403017044672ae7b2fa7307692e5
SHA2565143a5aae6bfe37c36189536f759e66134525bbc5803683fc779fe8a1249ec91
SHA5128cf034314bf389754545663ea4d174fbc9516239a55b580bdb063c17d8eb90e76664582a5823f3df0429e34efae90f8ddd3d1649c3b484f2082474bbf3144125
-
Filesize
3KB
MD59fc9d155a31cc6fca37ce89ab8a28728
SHA186a54d8184911b8f5f4527513aeb848e3345c163
SHA2560aa3404756bc22158550e3c06fb9cf70067f13079fd93cd21eb4cdc40246d06e
SHA512de7590d9c263c99f97941b0dc86e4e7a2a68f9f8a044e2fed00da51b2e9ec626dc8b4d065f9a6295f146e41764df96ac082d57c94474ae374d1adbceb56ea983
-
Filesize
1KB
MD50c9085a0198e8fd9630090021fd8245e
SHA16b2c9525d523c63c3ad8652a2d11987ac4ab45f2
SHA256b73dd49de4d1520fc3c643f4ab1d0690f6ef55aef0745011a885a8a96a3cb2c9
SHA512db71ede9cbac890b3e3e8f5f78300d56a5738ae6e06a0b2fa802c3f3065db3043cc98330c4ea418f65d8c0d6ebbf7ad0e11830b28d18b36e60fc47ddce950c58
-
Filesize
688KB
MD5c765336f0dcf4efdcc2101eed67cd30c
SHA1fa0279f59738c5aa3b6b20106e109ccd77f895a7
SHA256c5177fdc6031728e10141745cd69edbc91c92d14411a2dec6e8e8caa4f74ab28
SHA51206a67ac37c20897967e2cad453793a6ef1c7804d4c578404f845daa88c859b15b0acb51642e6ad23ca6ba6549b02d5f6c98b1fa402004bdbf9d646abab7ec891
-
Filesize
31KB
MD50a0db26708469f3ade7dfcc5679be8f9
SHA15f75aca605e5c967d43cd74a490a57b3166865ae
SHA2567799f60f6ebf7985a4c08a0185e93843f85ddea130f0c507a5b90c3f9b52e977
SHA5125f5e12ea1d9c4b368f7f31d9128107ee07bea8b65da77a8a83e178d2e94b7a3e7c20eda7835db66ab40b7131e11c23bd9922f490041a4205cfb07b84f10061fd