Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows10_x64 -
resource
win10 -
submitted
23-07-2020 15:16
Static task
static1
Behavioral task
behavioral1
Sample
KY6mW.exe
Resource
win7v200722
Behavioral task
behavioral2
Sample
KY6mW.exe
Resource
win10
General
-
Target
KY6mW.exe
-
Size
940KB
-
MD5
91465c291a92591087e70caa0d4c3370
-
SHA1
345fba0f611a59ddd30a8c87f793a80fbf82c50e
-
SHA256
ab6c220ed37a3771afb540e7b1179aea65119d6e3da91d55af7f659f61541f42
-
SHA512
d39d5256b4db45e8a5901a96341e2ca8e5f3dafa2b426227a1fe76f6268f8b2ca59a2c5ce332ea2f70a15287ae9a2703ca52c22dacd8beed54e0786f2b70a762
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
smss.comsmss.compid process 3796 smss.com 3772 smss.com -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
KY6mW.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce KY6mW.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" KY6mW.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
smss.comsmss.compid process 3796 smss.com 3796 smss.com 3796 smss.com 3772 smss.com 3772 smss.com 3772 smss.com -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
smss.comsmss.compid process 3796 smss.com 3796 smss.com 3796 smss.com 3772 smss.com 3772 smss.com 3772 smss.com -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
KY6mW.execmd.exesmss.comdescription pid process target process PID 3044 wrote to memory of 3828 3044 KY6mW.exe cmd.exe PID 3044 wrote to memory of 3828 3044 KY6mW.exe cmd.exe PID 3044 wrote to memory of 3828 3044 KY6mW.exe cmd.exe PID 3828 wrote to memory of 3872 3828 cmd.exe cmd.exe PID 3828 wrote to memory of 3872 3828 cmd.exe cmd.exe PID 3828 wrote to memory of 3872 3828 cmd.exe cmd.exe PID 3828 wrote to memory of 3340 3828 cmd.exe certutil.exe PID 3828 wrote to memory of 3340 3828 cmd.exe certutil.exe PID 3828 wrote to memory of 3340 3828 cmd.exe certutil.exe PID 3828 wrote to memory of 3796 3828 cmd.exe smss.com PID 3828 wrote to memory of 3796 3828 cmd.exe smss.com PID 3828 wrote to memory of 3796 3828 cmd.exe smss.com PID 3796 wrote to memory of 3772 3796 smss.com smss.com PID 3796 wrote to memory of 3772 3796 smss.com smss.com PID 3796 wrote to memory of 3772 3796 smss.com smss.com PID 3828 wrote to memory of 3612 3828 cmd.exe PING.EXE PID 3828 wrote to memory of 3612 3828 cmd.exe PING.EXE PID 3828 wrote to memory of 3612 3828 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\KY6mW.exe"C:\Users\Admin\AppData\Local\Temp\KY6mW.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\cmd.execmd /c MenJA.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Windows\SysWOW64\cmd.execmd /c if NOT GOHCSFBB == DESKTOP-QO5QU33 set /p ="M"3⤵PID:3872
-
-
C:\Windows\SysWOW64\certutil.execertutil -decode RJar.com V3⤵PID:3340
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\smss.comsmss.com V3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\smss.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\smss.com V4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3772
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 33⤵
- Runs ping.exe
PID:3612
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
41314d6909f6045c052e4166054cac9f
SHA105a81405a7d420d2c0fda62320b07e82d0322ab2
SHA25692c39fd5aa85b5791cd5fe18e402f30c1c048bf89b39c6eaba89686a17d89c29
SHA512dbb7786ab37d6762a2b317c88c91a625c73b4b37334728cf849b893ec0cfeb7c9148a614824789391bc58179fd968a3be0dc0febff38c0eccce688357e6682b2
-
MD5
d24f54fd7b07292f5efde4e24838660c
SHA13b28c4779043c3c1c84415f0dc4d7dea1bf51e37
SHA2563227a4c8a1f95b6f176d83ced9b6cb8668682c5f8dc5b1b40a43291144f47ef1
SHA512a1119e98d485b59bc3c5974b030a02c6c01ab515f79b989b223deb17b0309689ac513de344314b22e5c10044f234880c6c266dc8c26de88a741833f70cb8b2cb
-
MD5
1fdadf5f230b5d4102ed360df14602a5
SHA1c26e23f93811c48d5866267167208b3fb2f598cf
SHA256d703fa1905478b50838df074b2f739abccf63a3bc32d972a6cc5a4c1d0871013
SHA5126f745546255e70366d18c363ece46be6f5f8de7bc2b43fc23d602120e1214b6bc5c7665ee819346f56765c0758f9c33209f5421dc9fac3c31102fa10afbf2a34
-
MD5
e34f26c78aca81e89d971fefc0a3e61b
SHA13d41b36940b5d40c9e04c97e6ce43b0054571ce3
SHA256b0beb02d1997584598a110fa00cfc19434c162d2c205281e7806963bece32146
SHA512ddb7b9b9e885a2fdbb6fb43e74e2826dac2c43a957cb24ee34ca24c21aab25f3a3cacc5c7c0169d9020b1c821da5016264325905b3428a1160818742f25ec7a5
-
MD5
df6fbc5de331f39be67e2b343ff02083
SHA12791147f5aba7d5242d531f0444695b9fecb3c42
SHA256ccefe3c453a32c04dd03e835879aceae0b96e7d25359dc05a8cfa7a880c21936
SHA51235e1b55975104e9ddf24fc2842848f63c954f6e69bf8a4df370caaad43ff01f259fbd4e96e45bcbd2287192551afa3df5f9ad8726a3331d80a9c53fa558bf8a9
-
MD5
78ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317
-
MD5
78ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317
-
MD5
78ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317