Analysis
-
max time kernel
143s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2022, 18:27
Static task
static1
Behavioral task
behavioral1
Sample
461babea862884674941b3a8b6b03e0f9355717e81ea60f89ad5c8f9e195ac78.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
461babea862884674941b3a8b6b03e0f9355717e81ea60f89ad5c8f9e195ac78.exe
Resource
win10v2004-20220901-en
General
-
Target
461babea862884674941b3a8b6b03e0f9355717e81ea60f89ad5c8f9e195ac78.exe
-
Size
307KB
-
MD5
6a809db0a894a6dc1f6453c47baef1ff
-
SHA1
2057c211c46d9e4f0674a19935448b0fd31a7afa
-
SHA256
461babea862884674941b3a8b6b03e0f9355717e81ea60f89ad5c8f9e195ac78
-
SHA512
bda190b37f0f27f4fd146ce2649837f0b082b581d64c6b5b77a6b7e1506c365e82038c70346c4ac7e66ce35b4d0e6693630e90b5bb63c3df0fe1c8a5479fe232
-
SSDEEP
6144:4PfifS+J4LgjPOAxoUwqtT2nPgwehhdMh9+dWdP+s:4PqfS+J4Lgj6UhtSowehhah9+wF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4276 enkunku.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 461babea862884674941b3a8b6b03e0f9355717e81ea60f89ad5c8f9e195ac78.exe -
Loads dropped DLL 1 IoCs
pid Process 4276 enkunku.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 461babea862884674941b3a8b6b03e0f9355717e81ea60f89ad5c8f9e195ac78.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 2624 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4004 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4276 enkunku.exe 4276 enkunku.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4276 enkunku.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2624 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4276 enkunku.exe 4276 enkunku.exe 4276 enkunku.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4276 enkunku.exe 4276 enkunku.exe 4276 enkunku.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3180 wrote to memory of 3888 3180 461babea862884674941b3a8b6b03e0f9355717e81ea60f89ad5c8f9e195ac78.exe 90 PID 3180 wrote to memory of 3888 3180 461babea862884674941b3a8b6b03e0f9355717e81ea60f89ad5c8f9e195ac78.exe 90 PID 3180 wrote to memory of 3888 3180 461babea862884674941b3a8b6b03e0f9355717e81ea60f89ad5c8f9e195ac78.exe 90 PID 3888 wrote to memory of 2624 3888 cmd.exe 92 PID 3888 wrote to memory of 2624 3888 cmd.exe 92 PID 3888 wrote to memory of 2624 3888 cmd.exe 92 PID 3888 wrote to memory of 4004 3888 cmd.exe 93 PID 3888 wrote to memory of 4004 3888 cmd.exe 93 PID 3888 wrote to memory of 4004 3888 cmd.exe 93 PID 3888 wrote to memory of 4276 3888 cmd.exe 94 PID 3888 wrote to memory of 4276 3888 cmd.exe 94 PID 3888 wrote to memory of 4276 3888 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\461babea862884674941b3a8b6b03e0f9355717e81ea60f89ad5c8f9e195ac78.exe"C:\Users\Admin\AppData\Local\Temp\461babea862884674941b3a8b6b03e0f9355717e81ea60f89ad5c8f9e195ac78.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 3180 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\461babea862884674941b3a8b6b03e0f9355717e81ea60f89ad5c8f9e195ac78.exe" & start C:\Users\Admin\AppData\Local\enkunku.exe -f2⤵
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 31803⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2624
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:4004
-
-
C:\Users\Admin\AppData\Local\enkunku.exeC:\Users\Admin\AppData\Local\enkunku.exe -f3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4276
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD56a809db0a894a6dc1f6453c47baef1ff
SHA12057c211c46d9e4f0674a19935448b0fd31a7afa
SHA256461babea862884674941b3a8b6b03e0f9355717e81ea60f89ad5c8f9e195ac78
SHA512bda190b37f0f27f4fd146ce2649837f0b082b581d64c6b5b77a6b7e1506c365e82038c70346c4ac7e66ce35b4d0e6693630e90b5bb63c3df0fe1c8a5479fe232
-
Filesize
307KB
MD56a809db0a894a6dc1f6453c47baef1ff
SHA12057c211c46d9e4f0674a19935448b0fd31a7afa
SHA256461babea862884674941b3a8b6b03e0f9355717e81ea60f89ad5c8f9e195ac78
SHA512bda190b37f0f27f4fd146ce2649837f0b082b581d64c6b5b77a6b7e1506c365e82038c70346c4ac7e66ce35b4d0e6693630e90b5bb63c3df0fe1c8a5479fe232
-
Filesize
307KB
MD56a809db0a894a6dc1f6453c47baef1ff
SHA12057c211c46d9e4f0674a19935448b0fd31a7afa
SHA256461babea862884674941b3a8b6b03e0f9355717e81ea60f89ad5c8f9e195ac78
SHA512bda190b37f0f27f4fd146ce2649837f0b082b581d64c6b5b77a6b7e1506c365e82038c70346c4ac7e66ce35b4d0e6693630e90b5bb63c3df0fe1c8a5479fe232