Analysis

  • max time kernel
    152s
  • max time network
    96s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2022 07:15

General

  • Target

    0b4ab6b9644997979b1e519a6e16ba3f1ecbd5087f9c85a5f66594ec0ecc45b0.exe

  • Size

    192KB

  • MD5

    515bbd1877064455ca2d3d21f2a44a20

  • SHA1

    ec7682773685df6af68ac9e92a817a877dedca3f

  • SHA256

    0b4ab6b9644997979b1e519a6e16ba3f1ecbd5087f9c85a5f66594ec0ecc45b0

  • SHA512

    c13d5a2c4498de713eb08c10ec72bd9e6b6812c8aec49476824c36edd18aa7d8511ef4b7cc58bd92b24a670fa777b7567f030171322faf42f1adcbfe4d870494

  • SSDEEP

    3072:wu8+XROOBrpM3lt0bqO4deKIpS2Q9tC3UwtxaTSGzGXDzp8D8OJbhaDDe3oZO:oOBr63cbqO40K394aTSGzGZ8ognYM

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b4ab6b9644997979b1e519a6e16ba3f1ecbd5087f9c85a5f66594ec0ecc45b0.exe
    "C:\Users\Admin\AppData\Local\Temp\0b4ab6b9644997979b1e519a6e16ba3f1ecbd5087f9c85a5f66594ec0ecc45b0.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1604
    • C:\Users\Admin\kaaduw.exe
      "C:\Users\Admin\kaaduw.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1664

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\kaaduw.exe

    Filesize

    192KB

    MD5

    c53f56d532d4155f8b2e31c2b0b34b6e

    SHA1

    62d542e1096bc54a059d0df7eaf66373f0444e40

    SHA256

    776922c1beaf25e81b32cf9e4cb723d29b6cad3de49e4a1807be1f48349e1d98

    SHA512

    28b4b2021b94ba9fa4b532580291994a0029cde20ddd11ebd8def92c99eb4cea86d05f6bfec7f1969437b4c770924135efde8c0a4b6ed93bed339b2d1943f687

  • C:\Users\Admin\kaaduw.exe

    Filesize

    192KB

    MD5

    c53f56d532d4155f8b2e31c2b0b34b6e

    SHA1

    62d542e1096bc54a059d0df7eaf66373f0444e40

    SHA256

    776922c1beaf25e81b32cf9e4cb723d29b6cad3de49e4a1807be1f48349e1d98

    SHA512

    28b4b2021b94ba9fa4b532580291994a0029cde20ddd11ebd8def92c99eb4cea86d05f6bfec7f1969437b4c770924135efde8c0a4b6ed93bed339b2d1943f687

  • \Users\Admin\kaaduw.exe

    Filesize

    192KB

    MD5

    c53f56d532d4155f8b2e31c2b0b34b6e

    SHA1

    62d542e1096bc54a059d0df7eaf66373f0444e40

    SHA256

    776922c1beaf25e81b32cf9e4cb723d29b6cad3de49e4a1807be1f48349e1d98

    SHA512

    28b4b2021b94ba9fa4b532580291994a0029cde20ddd11ebd8def92c99eb4cea86d05f6bfec7f1969437b4c770924135efde8c0a4b6ed93bed339b2d1943f687

  • \Users\Admin\kaaduw.exe

    Filesize

    192KB

    MD5

    c53f56d532d4155f8b2e31c2b0b34b6e

    SHA1

    62d542e1096bc54a059d0df7eaf66373f0444e40

    SHA256

    776922c1beaf25e81b32cf9e4cb723d29b6cad3de49e4a1807be1f48349e1d98

    SHA512

    28b4b2021b94ba9fa4b532580291994a0029cde20ddd11ebd8def92c99eb4cea86d05f6bfec7f1969437b4c770924135efde8c0a4b6ed93bed339b2d1943f687

  • memory/1604-56-0x0000000075601000-0x0000000075603000-memory.dmp

    Filesize

    8KB