Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    04-12-2021 14:26

General

  • Target

    CAJ.exe

  • Size

    1.7MB

  • MD5

    011d1ed32a5521504f57593bbe5a1077

  • SHA1

    a94cf29b2fa5c518f4658e554225f667a23234c8

  • SHA256

    2739f9d88ca7b74774c449ada327c291f79147caeb678773bab78185f5c1fb24

  • SHA512

    eeed3bb9cd1376170596fef462b92379936f1dceee9ddf5dd58967145ae6e4b6b086edc54c9c2fef0a75169134875a450ff0285010bd99c148ee93a849e6f89a

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 4 IoCs
  • Registers COM server for autorun 1 TTPs
  • suricata: ET MALWARE Possible Windows executable sent when remote host claims to send a Text File

    suricata: ET MALWARE Possible Windows executable sent when remote host claims to send a Text File

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Downloads MZ/PE file
  • Drops file in Drivers directory 35 IoCs
  • Executes dropped EXE 1 IoCs
  • Sets file execution options in registry 2 TTPs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 10 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CAJ.exe
    "C:\Users\Admin\AppData\Local\Temp\CAJ.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Writes to the Master Boot Record (MBR)
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:668
    • \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kavlog2.exe
      "c:\program files (x86)\kingsoft\kingsoft antivirus\kavlog2.exe" -install
      2⤵
      • Executes dropped EXE
      PID:1740
    • \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ksoftmgr.exe
      "c:\program files (x86)\kingsoft\kingsoft antivirus\ksoftmgr.exe" -preload
      2⤵
        PID:516

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Change Default File Association

    1
    T1042

    Registry Run Keys / Startup Folder

    3
    T1060

    Bootkit

    1
    T1067

    Defense Evasion

    Modify Registry

    3
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Program Files (x86)\kingsoft\kingsoft antivirus\kavlog2.exe
      MD5

      c6370e05b2dc0067ae9cd7e08aefa413

      SHA1

      a88c413373a5dadf4fb8f75525b5f1386fa06f9b

      SHA256

      f0b532944b58c063e9635f69c022f586036421af133d864f9528284a50236298

      SHA512

      2f5d9ae4399ae981c6d2ffdd4f2741bfa56b7ed0b12289e226448f2e1c3f469beab831d772407d3364dca98cd9026eeca838ce6bb09cb31abc28890b6ae8fcb5

    • \Program Files (x86)\kingsoft\kingsoft antivirus\kavmenu.dll
      MD5

      3ffb75d40a51d96a39ba513e4d31f8a5

      SHA1

      f8acfefc52923ae8e993fb667e55d3a7742733d8

      SHA256

      ae84e36b6c2dcc92bc188b4eae99ccbcefcd6333bb9484485cd2fa2932431f00

      SHA512

      e4ad5908d825c2a1d008239980610b5fc78fe5b13adfe051e370cdfe13911a926fbdcb11d6b6d426fb3506ea12b68edb4ba413789190286b046aef9402237bed

    • \Program Files (x86)\kingsoft\kingsoft antivirus\kismain.exe
      MD5

      bf6d89aab7552c0d476f8fb67b25a3f9

      SHA1

      0f1fb42c32e6e314b8e4be592c7efe66dce34b3e

      SHA256

      543c7642f0166127ab445539130a9ebe3c1d8dfda656efc415a4367c0a097e8f

      SHA512

      368996fd7349812f2fbab4655fd614730686f6ec284d9c1dc8544ceb7022679538c592b65c8e98abcca7c18da9a0e37d53bbe4275b52e70e8b98ce491aacc543

    • \Program Files (x86)\kingsoft\kingsoft antivirus\security\kavbootc.sys
      MD5

      44a332318c9a823b85d1f5257dcc7ad9

      SHA1

      80a6e8cbd957f5280cdc69d4b1a441aba6bc6bf6

      SHA256

      ca615ede1d1356ac566189d4ba553f77ea074c4acb53d60b6f3144c8bfadde0c

      SHA512

      50b733732188c4ec42684fde06e9fc266d41c51c0009935c2fa9a301d80256122e9cab08e5b765e9270aa96138870c0881548cabd8891e42baadcbe416194c20

    • \Program Files (x86)\kingsoft\kingsoft antivirus\security\kavbootc.sys
      MD5

      44a332318c9a823b85d1f5257dcc7ad9

      SHA1

      80a6e8cbd957f5280cdc69d4b1a441aba6bc6bf6

      SHA256

      ca615ede1d1356ac566189d4ba553f77ea074c4acb53d60b6f3144c8bfadde0c

      SHA512

      50b733732188c4ec42684fde06e9fc266d41c51c0009935c2fa9a301d80256122e9cab08e5b765e9270aa96138870c0881548cabd8891e42baadcbe416194c20

    • \Program Files (x86)\kingsoft\kingsoft antivirus\security\ksde\kisknl.sys
      MD5

      916cb9541e41463afc49fc98b2f35ed2

      SHA1

      d6b45a579915638ac30bfac569b409848d59ea2f

      SHA256

      e888657b0591e3fe12a645f853cc458d91b32feed889fc6f6f9e8ab4b3160516

      SHA512

      12e66cc1ad1f3cc99b77a71fecd6b45fd29753588d86764c3d861a12f5d828055a845afac5eb89e4b0afa7c58744641cfec4421aca1337179de36b1cfde63485

    • \Program Files (x86)\kingsoft\kingsoft antivirus\security\ksde\kisknl.sys
      MD5

      916cb9541e41463afc49fc98b2f35ed2

      SHA1

      d6b45a579915638ac30bfac569b409848d59ea2f

      SHA256

      e888657b0591e3fe12a645f853cc458d91b32feed889fc6f6f9e8ab4b3160516

      SHA512

      12e66cc1ad1f3cc99b77a71fecd6b45fd29753588d86764c3d861a12f5d828055a845afac5eb89e4b0afa7c58744641cfec4421aca1337179de36b1cfde63485

    • \Program Files (x86)\kingsoft\kingsoft antivirus\uni0nst.exe
      MD5

      1db2018c83fe943805aa35a14f8a80bb

      SHA1

      08ac6ac1d4ee39ca40d081e777d02127ba2326f6

      SHA256

      405d8822ada249d60efe45756b70211506184f970debed1e770eb06636cd53bb

      SHA512

      2594daaa72e37d9cff74e3c19852bce72a478a16e8ddb0c0bd1c688c217a4eef13e3766f28fea8412e1983d9f6e78da327b43befe35a20c8a4456c11521069c9

    • \Users\Admin\AppData\Local\Temp\kdb_semrjgj.dll
      MD5

      13ad0c8c5ad273243ed73a8e8b96ef26

      SHA1

      8129f41443fb0658a0cc07a1587ea9b663675f60

      SHA256

      3100e880e5309f562335b6a490d66b456515023222ecea113ef956dc91afd674

      SHA512

      bf9d707dc194fbf5040b401a265a30fa40d0aa4f5d3c1fd0178d1782a7ef95385b1cc8916ecb4ae76798a95858995b28891a2dd0e58df592b2985b22974bfce6

    • memory/668-55-0x0000000076231000-0x0000000076233000-memory.dmp
      Filesize

      8KB

    • memory/668-56-0x00000000002E0000-0x00000000002E1000-memory.dmp
      Filesize

      4KB

    • memory/1740-66-0x0000000000000000-mapping.dmp