Overview
overview
10Static
static
1kmSdem1.exe
windows7-x64
7kmSdem1.exe
windows10-2004-x64
3readme[1].exe
windows7-x64
10readme[1].exe
windows10-2004-x64
10voyjy.exe
windows7-x64
1voyjy.exe
windows10-2004-x64
3w9ks9.exe
windows7-x64
7w9ks9.exe
windows10-2004-x64
3wpbt0.exe
windows7-x64
wpbt0.exe
windows10-2004-x64
10Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-11-2024 16:59
Static task
static1
Behavioral task
behavioral1
Sample
kmSdem1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
kmSdem1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
readme[1].exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
readme[1].exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
voyjy.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
voyjy.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
w9ks9.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
w9ks9.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
wpbt0.exe
Resource
win7-20240903-en
General
-
Target
kmSdem1.exe
-
Size
268KB
-
MD5
dae810ed8cf180a99a0c0572b4f8f9b5
-
SHA1
1923b46caac111b8fa04345cbfe9861e5fca7c32
-
SHA256
f781f7a6d12d8e7581fa4ccd6365f3026af61df4b4a1b2d27d56e8b6bf118aea
-
SHA512
5792e317bba8c5d4ca305fd427b03dd972e1e8057190695df6aac41b705ab7e3686fedb3da54fd806e1ebb04cc7a3eac1525a5f7a0c8e20279915a830505b7e8
-
SSDEEP
6144:SKDFWqyd3oxcdzOjcufgM7e3lSQtZ0PoOKEtq70uHRinFBqLTabu0W:lDwu+OjcufWlvQoOKEtY/xUBqLSxW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2596 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2908 seula.exe -
Loads dropped DLL 2 IoCs
pid Process 2820 kmSdem1.exe 2820 kmSdem1.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\{D828F808-3C80-AD4F-7E84-E44A5F96C757} = "C:\\Users\\Admin\\AppData\\Roaming\\Orywi\\seula.exe" seula.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2820 set thread context of 2596 2820 kmSdem1.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kmSdem1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Privacy kmSdem1.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" kmSdem1.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2908 seula.exe 2908 seula.exe 2908 seula.exe 2908 seula.exe 2908 seula.exe 2908 seula.exe 2908 seula.exe 2908 seula.exe 2908 seula.exe 2908 seula.exe 2908 seula.exe 2908 seula.exe 2908 seula.exe 2908 seula.exe 2908 seula.exe 2908 seula.exe 2908 seula.exe 2908 seula.exe 2908 seula.exe 2908 seula.exe 2908 seula.exe 2908 seula.exe 2908 seula.exe 2908 seula.exe 2908 seula.exe 2908 seula.exe 2908 seula.exe 2908 seula.exe 2908 seula.exe 2908 seula.exe 2908 seula.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2820 kmSdem1.exe 2908 seula.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2908 2820 kmSdem1.exe 30 PID 2820 wrote to memory of 2908 2820 kmSdem1.exe 30 PID 2820 wrote to memory of 2908 2820 kmSdem1.exe 30 PID 2820 wrote to memory of 2908 2820 kmSdem1.exe 30 PID 2908 wrote to memory of 1060 2908 seula.exe 18 PID 2908 wrote to memory of 1060 2908 seula.exe 18 PID 2908 wrote to memory of 1060 2908 seula.exe 18 PID 2908 wrote to memory of 1060 2908 seula.exe 18 PID 2908 wrote to memory of 1060 2908 seula.exe 18 PID 2908 wrote to memory of 1116 2908 seula.exe 19 PID 2908 wrote to memory of 1116 2908 seula.exe 19 PID 2908 wrote to memory of 1116 2908 seula.exe 19 PID 2908 wrote to memory of 1116 2908 seula.exe 19 PID 2908 wrote to memory of 1116 2908 seula.exe 19 PID 2908 wrote to memory of 1148 2908 seula.exe 20 PID 2908 wrote to memory of 1148 2908 seula.exe 20 PID 2908 wrote to memory of 1148 2908 seula.exe 20 PID 2908 wrote to memory of 1148 2908 seula.exe 20 PID 2908 wrote to memory of 1148 2908 seula.exe 20 PID 2908 wrote to memory of 2040 2908 seula.exe 23 PID 2908 wrote to memory of 2040 2908 seula.exe 23 PID 2908 wrote to memory of 2040 2908 seula.exe 23 PID 2908 wrote to memory of 2040 2908 seula.exe 23 PID 2908 wrote to memory of 2040 2908 seula.exe 23 PID 2908 wrote to memory of 2820 2908 seula.exe 29 PID 2908 wrote to memory of 2820 2908 seula.exe 29 PID 2908 wrote to memory of 2820 2908 seula.exe 29 PID 2908 wrote to memory of 2820 2908 seula.exe 29 PID 2908 wrote to memory of 2820 2908 seula.exe 29 PID 2820 wrote to memory of 2596 2820 kmSdem1.exe 31 PID 2820 wrote to memory of 2596 2820 kmSdem1.exe 31 PID 2820 wrote to memory of 2596 2820 kmSdem1.exe 31 PID 2820 wrote to memory of 2596 2820 kmSdem1.exe 31 PID 2820 wrote to memory of 2596 2820 kmSdem1.exe 31 PID 2820 wrote to memory of 2596 2820 kmSdem1.exe 31 PID 2820 wrote to memory of 2596 2820 kmSdem1.exe 31 PID 2820 wrote to memory of 2596 2820 kmSdem1.exe 31 PID 2820 wrote to memory of 2596 2820 kmSdem1.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1060
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1116
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\kmSdem1.exe"C:\Users\Admin\AppData\Local\Temp\kmSdem1.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Roaming\Orywi\seula.exe"C:\Users\Admin\AppData\Roaming\Orywi\seula.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2908
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp6fcf27cb.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2596
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
193B
MD5d9817e28abf37e964984c90926c3b221
SHA101e7c33274fcc732e236d9532753948369ffb453
SHA256005d59b78976bf1db4ba94c51ff2d9528499fb61d18aa7802f8340339a1e6146
SHA512cf360ee55ba7a0edad0f9492ded4e989ad1e8250e969312cca98c25a4b5d1165378126ce34c5ce64a14ed3d6c07d0e28c2616be8af77dead6fc0bcf5c6e10258
-
Filesize
268KB
MD504b7131954307e58b8dbe6aa92cea20d
SHA19924a635ef9ea1ba58b707b2c3392c2ffc9adc5b
SHA256447c337150699862cf450d18a1bf1654ff75bd74f1a8b1b9b0b2872b8705494e
SHA51202cb6326611f3c308d299d5f2dc631b55418e4fd099e0d25eb78384ace52b1e1cb25612c290f9f99f676426abc3099a287ee250e8c52a48afa96204f56df3e88