Analysis
-
max time kernel
62s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 07:44
Static task
static1
Behavioral task
behavioral1
Sample
c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72.exe
Resource
win10v2004-20220812-en
General
-
Target
c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72.exe
-
Size
42KB
-
MD5
890ada7614f2d2e7aac6c8e6e6303072
-
SHA1
df9b19d760a09c55285a90581fb769925b1351e9
-
SHA256
c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72
-
SHA512
5306b3df97f2ffd011533412b09774a737c4aab8e21c9489fc15ef48c60c94bd8dfc16ed0e58301934b5a20487cf843327f2459d62af9c0e51025f48cb621fb1
-
SSDEEP
768:rppWsMo8MeEDVWkcQjfiLzP674J52B7X07OJbzdXoiPgtPErj6ojlcKe:rruoMLiaLzY4J247ONdfgw6glj
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1160 kknijjcn.exe 1720 kknijjcn.exe -
Deletes itself 1 IoCs
pid Process 1160 kknijjcn.exe -
Loads dropped DLL 6 IoCs
pid Process 2024 c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72.exe 2024 c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72.exe 1160 kknijjcn.exe 1160 kknijjcn.exe 1160 kknijjcn.exe 1160 kknijjcn.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\kknijjcn.exe c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72.exe File opened for modification \??\c:\windows\SysWOW64\kknijjcn.exe c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00000000-0000-0000-0000-000000000001} c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00000000-0000-0000-0000-000000000001}\InprocServer32 kknijjcn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00000000-0000-0000-0000-000000000001}\InprocServer32 kknijjcn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00000000-0000-0000-0000-000000000001}\InprocServer32 c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2024 wrote to memory of 892 2024 c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72.exe 27 PID 2024 wrote to memory of 892 2024 c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72.exe 27 PID 2024 wrote to memory of 892 2024 c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72.exe 27 PID 2024 wrote to memory of 892 2024 c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72.exe 27 PID 2024 wrote to memory of 892 2024 c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72.exe 27 PID 2024 wrote to memory of 892 2024 c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72.exe 27 PID 2024 wrote to memory of 892 2024 c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72.exe 27 PID 2024 wrote to memory of 1160 2024 c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72.exe 28 PID 2024 wrote to memory of 1160 2024 c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72.exe 28 PID 2024 wrote to memory of 1160 2024 c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72.exe 28 PID 2024 wrote to memory of 1160 2024 c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72.exe 28 PID 1160 wrote to memory of 1224 1160 kknijjcn.exe 29 PID 1160 wrote to memory of 1224 1160 kknijjcn.exe 29 PID 1160 wrote to memory of 1224 1160 kknijjcn.exe 29 PID 1160 wrote to memory of 1224 1160 kknijjcn.exe 29 PID 1160 wrote to memory of 1224 1160 kknijjcn.exe 29 PID 1160 wrote to memory of 1224 1160 kknijjcn.exe 29 PID 1160 wrote to memory of 1224 1160 kknijjcn.exe 29 PID 1160 wrote to memory of 1720 1160 kknijjcn.exe 30 PID 1160 wrote to memory of 1720 1160 kknijjcn.exe 30 PID 1160 wrote to memory of 1720 1160 kknijjcn.exe 30 PID 1160 wrote to memory of 1720 1160 kknijjcn.exe 30 PID 1720 wrote to memory of 820 1720 kknijjcn.exe 31 PID 1720 wrote to memory of 820 1720 kknijjcn.exe 31 PID 1720 wrote to memory of 820 1720 kknijjcn.exe 31 PID 1720 wrote to memory of 820 1720 kknijjcn.exe 31 PID 1720 wrote to memory of 820 1720 kknijjcn.exe 31 PID 1720 wrote to memory of 820 1720 kknijjcn.exe 31 PID 1720 wrote to memory of 820 1720 kknijjcn.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72.exe"C:\Users\Admin\AppData\Local\Temp\c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" C:\Windows\system32\SafeSearch.dll /u /s2⤵PID:892
-
-
C:\windows\SysWOW64\kknijjcn.exe"C:\windows\system32\kknijjcn.exe" -kill c:\users\admin\appdata\local\temp\c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72.exe /install2⤵
- Executes dropped EXE
- Deletes itself
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" C:\Windows\system32\SafeSearch.dll /u /s3⤵PID:1224
-
-
C:\windows\SysWOW64\kknijjcn.exe"C:\windows\system32\kknijjcn.exe" -kill c:\windows\syswow64\kknijjcn.exe /install /install3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" C:\Windows\system32\SafeSearch.dll /u /s4⤵PID:820
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD5890ada7614f2d2e7aac6c8e6e6303072
SHA1df9b19d760a09c55285a90581fb769925b1351e9
SHA256c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72
SHA5125306b3df97f2ffd011533412b09774a737c4aab8e21c9489fc15ef48c60c94bd8dfc16ed0e58301934b5a20487cf843327f2459d62af9c0e51025f48cb621fb1
-
Filesize
42KB
MD5890ada7614f2d2e7aac6c8e6e6303072
SHA1df9b19d760a09c55285a90581fb769925b1351e9
SHA256c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72
SHA5125306b3df97f2ffd011533412b09774a737c4aab8e21c9489fc15ef48c60c94bd8dfc16ed0e58301934b5a20487cf843327f2459d62af9c0e51025f48cb621fb1
-
Filesize
42KB
MD5890ada7614f2d2e7aac6c8e6e6303072
SHA1df9b19d760a09c55285a90581fb769925b1351e9
SHA256c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72
SHA5125306b3df97f2ffd011533412b09774a737c4aab8e21c9489fc15ef48c60c94bd8dfc16ed0e58301934b5a20487cf843327f2459d62af9c0e51025f48cb621fb1
-
Filesize
42KB
MD5890ada7614f2d2e7aac6c8e6e6303072
SHA1df9b19d760a09c55285a90581fb769925b1351e9
SHA256c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72
SHA5125306b3df97f2ffd011533412b09774a737c4aab8e21c9489fc15ef48c60c94bd8dfc16ed0e58301934b5a20487cf843327f2459d62af9c0e51025f48cb621fb1
-
Filesize
42KB
MD5890ada7614f2d2e7aac6c8e6e6303072
SHA1df9b19d760a09c55285a90581fb769925b1351e9
SHA256c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72
SHA5125306b3df97f2ffd011533412b09774a737c4aab8e21c9489fc15ef48c60c94bd8dfc16ed0e58301934b5a20487cf843327f2459d62af9c0e51025f48cb621fb1
-
Filesize
42KB
MD5890ada7614f2d2e7aac6c8e6e6303072
SHA1df9b19d760a09c55285a90581fb769925b1351e9
SHA256c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72
SHA5125306b3df97f2ffd011533412b09774a737c4aab8e21c9489fc15ef48c60c94bd8dfc16ed0e58301934b5a20487cf843327f2459d62af9c0e51025f48cb621fb1
-
Filesize
42KB
MD5890ada7614f2d2e7aac6c8e6e6303072
SHA1df9b19d760a09c55285a90581fb769925b1351e9
SHA256c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72
SHA5125306b3df97f2ffd011533412b09774a737c4aab8e21c9489fc15ef48c60c94bd8dfc16ed0e58301934b5a20487cf843327f2459d62af9c0e51025f48cb621fb1
-
Filesize
42KB
MD5890ada7614f2d2e7aac6c8e6e6303072
SHA1df9b19d760a09c55285a90581fb769925b1351e9
SHA256c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72
SHA5125306b3df97f2ffd011533412b09774a737c4aab8e21c9489fc15ef48c60c94bd8dfc16ed0e58301934b5a20487cf843327f2459d62af9c0e51025f48cb621fb1
-
Filesize
42KB
MD5890ada7614f2d2e7aac6c8e6e6303072
SHA1df9b19d760a09c55285a90581fb769925b1351e9
SHA256c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72
SHA5125306b3df97f2ffd011533412b09774a737c4aab8e21c9489fc15ef48c60c94bd8dfc16ed0e58301934b5a20487cf843327f2459d62af9c0e51025f48cb621fb1