Analysis

  • max time kernel
    62s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 07:44

General

  • Target

    c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72.exe

  • Size

    42KB

  • MD5

    890ada7614f2d2e7aac6c8e6e6303072

  • SHA1

    df9b19d760a09c55285a90581fb769925b1351e9

  • SHA256

    c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72

  • SHA512

    5306b3df97f2ffd011533412b09774a737c4aab8e21c9489fc15ef48c60c94bd8dfc16ed0e58301934b5a20487cf843327f2459d62af9c0e51025f48cb621fb1

  • SSDEEP

    768:rppWsMo8MeEDVWkcQjfiLzP674J52B7X07OJbzdXoiPgtPErj6ojlcKe:rruoMLiaLzY4J247ONdfgw6glj

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 6 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72.exe
    "C:\Users\Admin\AppData\Local\Temp\c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\system32\regsvr32.exe" C:\Windows\system32\SafeSearch.dll /u /s
      2⤵
        PID:892
      • C:\windows\SysWOW64\kknijjcn.exe
        "C:\windows\system32\kknijjcn.exe" -kill c:\users\admin\appdata\local\temp\c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72.exe /install
        2⤵
        • Executes dropped EXE
        • Deletes itself
        • Loads dropped DLL
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1160
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" C:\Windows\system32\SafeSearch.dll /u /s
          3⤵
            PID:1224
          • C:\windows\SysWOW64\kknijjcn.exe
            "C:\windows\system32\kknijjcn.exe" -kill c:\windows\syswow64\kknijjcn.exe /install /install
            3⤵
            • Executes dropped EXE
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:1720
            • C:\Windows\SysWOW64\regsvr32.exe
              "C:\Windows\system32\regsvr32.exe" C:\Windows\system32\SafeSearch.dll /u /s
              4⤵
                PID:820

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\kknijjcn.exe

          Filesize

          42KB

          MD5

          890ada7614f2d2e7aac6c8e6e6303072

          SHA1

          df9b19d760a09c55285a90581fb769925b1351e9

          SHA256

          c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72

          SHA512

          5306b3df97f2ffd011533412b09774a737c4aab8e21c9489fc15ef48c60c94bd8dfc16ed0e58301934b5a20487cf843327f2459d62af9c0e51025f48cb621fb1

        • C:\Windows\SysWOW64\kknijjcn.exe

          Filesize

          42KB

          MD5

          890ada7614f2d2e7aac6c8e6e6303072

          SHA1

          df9b19d760a09c55285a90581fb769925b1351e9

          SHA256

          c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72

          SHA512

          5306b3df97f2ffd011533412b09774a737c4aab8e21c9489fc15ef48c60c94bd8dfc16ed0e58301934b5a20487cf843327f2459d62af9c0e51025f48cb621fb1

        • \??\c:\windows\SysWOW64\kknijjcn.exe

          Filesize

          42KB

          MD5

          890ada7614f2d2e7aac6c8e6e6303072

          SHA1

          df9b19d760a09c55285a90581fb769925b1351e9

          SHA256

          c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72

          SHA512

          5306b3df97f2ffd011533412b09774a737c4aab8e21c9489fc15ef48c60c94bd8dfc16ed0e58301934b5a20487cf843327f2459d62af9c0e51025f48cb621fb1

        • \Windows\SysWOW64\kknijjcn.exe

          Filesize

          42KB

          MD5

          890ada7614f2d2e7aac6c8e6e6303072

          SHA1

          df9b19d760a09c55285a90581fb769925b1351e9

          SHA256

          c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72

          SHA512

          5306b3df97f2ffd011533412b09774a737c4aab8e21c9489fc15ef48c60c94bd8dfc16ed0e58301934b5a20487cf843327f2459d62af9c0e51025f48cb621fb1

        • \Windows\SysWOW64\kknijjcn.exe

          Filesize

          42KB

          MD5

          890ada7614f2d2e7aac6c8e6e6303072

          SHA1

          df9b19d760a09c55285a90581fb769925b1351e9

          SHA256

          c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72

          SHA512

          5306b3df97f2ffd011533412b09774a737c4aab8e21c9489fc15ef48c60c94bd8dfc16ed0e58301934b5a20487cf843327f2459d62af9c0e51025f48cb621fb1

        • \Windows\SysWOW64\kknijjcn.exe

          Filesize

          42KB

          MD5

          890ada7614f2d2e7aac6c8e6e6303072

          SHA1

          df9b19d760a09c55285a90581fb769925b1351e9

          SHA256

          c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72

          SHA512

          5306b3df97f2ffd011533412b09774a737c4aab8e21c9489fc15ef48c60c94bd8dfc16ed0e58301934b5a20487cf843327f2459d62af9c0e51025f48cb621fb1

        • \Windows\SysWOW64\kknijjcn.exe

          Filesize

          42KB

          MD5

          890ada7614f2d2e7aac6c8e6e6303072

          SHA1

          df9b19d760a09c55285a90581fb769925b1351e9

          SHA256

          c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72

          SHA512

          5306b3df97f2ffd011533412b09774a737c4aab8e21c9489fc15ef48c60c94bd8dfc16ed0e58301934b5a20487cf843327f2459d62af9c0e51025f48cb621fb1

        • \Windows\SysWOW64\kknijjcn.exe

          Filesize

          42KB

          MD5

          890ada7614f2d2e7aac6c8e6e6303072

          SHA1

          df9b19d760a09c55285a90581fb769925b1351e9

          SHA256

          c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72

          SHA512

          5306b3df97f2ffd011533412b09774a737c4aab8e21c9489fc15ef48c60c94bd8dfc16ed0e58301934b5a20487cf843327f2459d62af9c0e51025f48cb621fb1

        • \Windows\SysWOW64\kknijjcn.exe

          Filesize

          42KB

          MD5

          890ada7614f2d2e7aac6c8e6e6303072

          SHA1

          df9b19d760a09c55285a90581fb769925b1351e9

          SHA256

          c247ef34d54ba95b7bbf6aa776924648259324f94ddd0349521026d3c6b52c72

          SHA512

          5306b3df97f2ffd011533412b09774a737c4aab8e21c9489fc15ef48c60c94bd8dfc16ed0e58301934b5a20487cf843327f2459d62af9c0e51025f48cb621fb1

        • memory/2024-61-0x0000000000400000-0x000000000041E000-memory.dmp

          Filesize

          120KB

        • memory/2024-56-0x0000000000400000-0x000000000041E000-memory.dmp

          Filesize

          120KB

        • memory/2024-54-0x00000000766D1000-0x00000000766D3000-memory.dmp

          Filesize

          8KB