Analysis

  • max time kernel
    91s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 03:33

General

  • Target

    cikti.exe

  • Size

    724KB

  • MD5

    2066f7d292f4645896ddcb19977fede7

  • SHA1

    c7ca3a830c66647996dba70e0481bb80f44f420e

  • SHA256

    bbbf72e3e18bdf0c1ba98791e138c81e7915de949d4a27ad15eada0109a356ac

  • SHA512

    8cb5161cd5665475bee4166e0a4e49bb777e0928dc34afa18eb66527caef38ab5afbbbc606c4e599e03a6799577cb8fcac28ee20cb41a345623a38be65b5d423

  • SSDEEP

    12288:Q7v4A8TUzz44qOWmQhoWdFzU6N5HWMV6vmQJRAE/cDtM9JSPRB:jlUzz49OWmQ9BNEkhKRAE/GtAuRB

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cikti.exe
    "C:\Users\Admin\AppData\Local\Temp\cikti.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4364
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c check.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2740
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /V Shell /D "explorer.exe "C:\Windows\scvhost.exe"" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4960
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /V Shell /D "explorer.exe "C:\Windows\scvhost.exe"" /f
          4⤵
          • Modifies WinLogon for persistence
          PID:4980
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V CTFMON /D "C:\Windows\scvhost.exe" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:5024
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V CTFMON /D "C:\Windows\scvhost.exe" /f
          4⤵
          • Adds Run key to start application
          • Modifies registry key
          PID:788
    • C:\Windows\scvhost.exe
      C:\Windows\scvhost.exe
      2⤵
      • Executes dropped EXE
      PID:2256

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\check.bat

    Filesize

    256B

    MD5

    cd3605d0f09d4fb449006593e8210bd2

    SHA1

    8805b7072289b19a74d2b6627475b8d850534550

    SHA256

    4855b8e66b23205cb754ee8518fc12676a569d8b7902dde29deaa82062960024

    SHA512

    5a0a73c59c639a3fd12cb0992669cfb48f648f70d9074faabd09339d3fc1c25fa230b654dd00b47396eea4baaff774a590b56949e90404aacaecd9af61c99be9

  • C:\Windows\scvhost.exe

    Filesize

    724KB

    MD5

    2066f7d292f4645896ddcb19977fede7

    SHA1

    c7ca3a830c66647996dba70e0481bb80f44f420e

    SHA256

    bbbf72e3e18bdf0c1ba98791e138c81e7915de949d4a27ad15eada0109a356ac

    SHA512

    8cb5161cd5665475bee4166e0a4e49bb777e0928dc34afa18eb66527caef38ab5afbbbc606c4e599e03a6799577cb8fcac28ee20cb41a345623a38be65b5d423

  • C:\Windows\scvhost.exe

    Filesize

    724KB

    MD5

    2066f7d292f4645896ddcb19977fede7

    SHA1

    c7ca3a830c66647996dba70e0481bb80f44f420e

    SHA256

    bbbf72e3e18bdf0c1ba98791e138c81e7915de949d4a27ad15eada0109a356ac

    SHA512

    8cb5161cd5665475bee4166e0a4e49bb777e0928dc34afa18eb66527caef38ab5afbbbc606c4e599e03a6799577cb8fcac28ee20cb41a345623a38be65b5d423