Analysis
-
max time kernel
152s -
max time network
74s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 07:22
Static task
static1
Behavioral task
behavioral1
Sample
97c22c54f3b93e6d871b4e0993bf7248b71985f505836e3fa19e2fd553e52405.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
97c22c54f3b93e6d871b4e0993bf7248b71985f505836e3fa19e2fd553e52405.exe
Resource
win10v2004-20220812-en
General
-
Target
97c22c54f3b93e6d871b4e0993bf7248b71985f505836e3fa19e2fd553e52405.exe
-
Size
244KB
-
MD5
6b754f2724271cc8c97b154b65cc0867
-
SHA1
fe7e7f5d9dc8205039464a9140f6701f9b12f366
-
SHA256
97c22c54f3b93e6d871b4e0993bf7248b71985f505836e3fa19e2fd553e52405
-
SHA512
26d54099406a1f71ff5f5b8513fce3a9e620aea0146b9192d8358d0420c01c73cb1eaa01eaa4f6cdf18e2a55814b354450a13ba9c9a9a7307791f2f3a2b09d80
-
SSDEEP
6144:6R6nw8DFe0qip4r1XNOmNBLxAG7H59R7g0fY4rGK/fObT/bGijVq1Wzr/+mNGXne:6cw8DFe0qip4rZNOm3FAG7H59R7g0fYz
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 97c22c54f3b93e6d871b4e0993bf7248b71985f505836e3fa19e2fd553e52405.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kaukio.exe -
Executes dropped EXE 1 IoCs
pid Process 1492 kaukio.exe -
Loads dropped DLL 2 IoCs
pid Process 608 97c22c54f3b93e6d871b4e0993bf7248b71985f505836e3fa19e2fd553e52405.exe 608 97c22c54f3b93e6d871b4e0993bf7248b71985f505836e3fa19e2fd553e52405.exe -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /c" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /v" kaukio.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /u" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /o" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /b" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /M" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /l" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /z" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /R" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /N" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /Q" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /W" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /i" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /F" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /C" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /j" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /J" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /E" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /K" kaukio.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 97c22c54f3b93e6d871b4e0993bf7248b71985f505836e3fa19e2fd553e52405.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /B" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /L" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /U" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /n" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /q" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /X" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /m" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /S" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /T" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /Y" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /H" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /d" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /a" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /t" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /f" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /Z" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /k" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /s" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /g" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /r" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /y" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /I" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /D" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /O" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /P" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /w" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /n" 97c22c54f3b93e6d871b4e0993bf7248b71985f505836e3fa19e2fd553e52405.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /G" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /A" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /x" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /p" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /V" kaukio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaukio = "C:\\Users\\Admin\\kaukio.exe /e" kaukio.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 608 97c22c54f3b93e6d871b4e0993bf7248b71985f505836e3fa19e2fd553e52405.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe 1492 kaukio.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 608 97c22c54f3b93e6d871b4e0993bf7248b71985f505836e3fa19e2fd553e52405.exe 1492 kaukio.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 608 wrote to memory of 1492 608 97c22c54f3b93e6d871b4e0993bf7248b71985f505836e3fa19e2fd553e52405.exe 28 PID 608 wrote to memory of 1492 608 97c22c54f3b93e6d871b4e0993bf7248b71985f505836e3fa19e2fd553e52405.exe 28 PID 608 wrote to memory of 1492 608 97c22c54f3b93e6d871b4e0993bf7248b71985f505836e3fa19e2fd553e52405.exe 28 PID 608 wrote to memory of 1492 608 97c22c54f3b93e6d871b4e0993bf7248b71985f505836e3fa19e2fd553e52405.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\97c22c54f3b93e6d871b4e0993bf7248b71985f505836e3fa19e2fd553e52405.exe"C:\Users\Admin\AppData\Local\Temp\97c22c54f3b93e6d871b4e0993bf7248b71985f505836e3fa19e2fd553e52405.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Users\Admin\kaukio.exe"C:\Users\Admin\kaukio.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1492
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD52013b45b64b3d437d4ca4d2f3d365973
SHA10861c7c02d6b3a018a70b3b4db76f2469df89231
SHA2569acd6e896b7cf52d821c6bd6f34d3969dc5f257fefd9ee4bafc6c9971a0651b2
SHA51240c1865b26930de4efa1ed6994d382648f8541a8c9aa6032b38bfdf6e9709f5ae310c5ba4ce624abdc8a140113b098c776c1e50fec599488db73ad252a2a7ff2
-
Filesize
244KB
MD52013b45b64b3d437d4ca4d2f3d365973
SHA10861c7c02d6b3a018a70b3b4db76f2469df89231
SHA2569acd6e896b7cf52d821c6bd6f34d3969dc5f257fefd9ee4bafc6c9971a0651b2
SHA51240c1865b26930de4efa1ed6994d382648f8541a8c9aa6032b38bfdf6e9709f5ae310c5ba4ce624abdc8a140113b098c776c1e50fec599488db73ad252a2a7ff2
-
Filesize
244KB
MD52013b45b64b3d437d4ca4d2f3d365973
SHA10861c7c02d6b3a018a70b3b4db76f2469df89231
SHA2569acd6e896b7cf52d821c6bd6f34d3969dc5f257fefd9ee4bafc6c9971a0651b2
SHA51240c1865b26930de4efa1ed6994d382648f8541a8c9aa6032b38bfdf6e9709f5ae310c5ba4ce624abdc8a140113b098c776c1e50fec599488db73ad252a2a7ff2
-
Filesize
244KB
MD52013b45b64b3d437d4ca4d2f3d365973
SHA10861c7c02d6b3a018a70b3b4db76f2469df89231
SHA2569acd6e896b7cf52d821c6bd6f34d3969dc5f257fefd9ee4bafc6c9971a0651b2
SHA51240c1865b26930de4efa1ed6994d382648f8541a8c9aa6032b38bfdf6e9709f5ae310c5ba4ce624abdc8a140113b098c776c1e50fec599488db73ad252a2a7ff2