Analysis

  • max time kernel
    151s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/03/2025, 20:53

General

  • Target

    custom_Suiika_V1_03/Custom_Suiika_V1_03_4k/Expressions/Hairband Charm.exp3.json

  • Size

    164B

  • MD5

    d87436e32823afaca21a26522094fe28

  • SHA1

    660831215e330265e499668371c9a1ff8a4d72b1

  • SHA256

    dfa81ae55bdd2b7948a29981ddf146669e898297c6b0720cbda8df089a35f4b9

  • SHA512

    9dfe7703c2268bd3ad56962644f74018723e37526d61221df7d4f0f7bd3796e2d7ffbd5355d0526910bff310d8d731c9005957d4412055eeffdbac9796aa6239

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\custom_Suiika_V1_03\Custom_Suiika_V1_03_4k\Expressions\Hairband Charm.exp3.json"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\custom_Suiika_V1_03\Custom_Suiika_V1_03_4k\Expressions\Hairband Charm.exp3.json
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2788
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\custom_Suiika_V1_03\Custom_Suiika_V1_03_4k\Expressions\Hairband Charm.exp3.json"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    3c57d31bee82df223190dccf9b436f64

    SHA1

    cb7e5146fd21c47a1e4fe982996a7cd9e8eb84f8

    SHA256

    856e2816382f176a27f7b3b944b9dadf57c4e94add5b751697a8b5965317f625

    SHA512

    719754fb5265aca703f74af5e5ba7084aa3bf390d246312a4c455ddfa1afbe1f37883d315ffecee08dad939d1bd7ffee42eab45cdfd0c111773024526e2e28f3