Analysis
-
max time kernel
151s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 16:09
Static task
static1
Behavioral task
behavioral1
Sample
8f06fc88d506abe6358290718e936022eb7008512bc7f5c29beaec610af84b81.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8f06fc88d506abe6358290718e936022eb7008512bc7f5c29beaec610af84b81.exe
Resource
win10v2004-20220812-en
General
-
Target
8f06fc88d506abe6358290718e936022eb7008512bc7f5c29beaec610af84b81.exe
-
Size
126KB
-
MD5
4cb177a9fdcd6d8a46acae4e1f92f306
-
SHA1
5472383022dd0c250fb7f5457aa9a059695d27e7
-
SHA256
8f06fc88d506abe6358290718e936022eb7008512bc7f5c29beaec610af84b81
-
SHA512
14378e659a979f39dfb2e08f2bef53e334aa283cf103023757ff211f36cf4d62df9af1329214a7d5b97831310fe4bf5f708ef9e6656cc3052601dacd24f325f5
-
SSDEEP
3072:C6KkHYqgi5I7Bd7XAxpZVT4ghw+uSs0xURgbX:5h4vpBxUpZbK+uSsjk
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 8f06fc88d506abe6358290718e936022eb7008512bc7f5c29beaec610af84b81.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kdloy.exe -
Executes dropped EXE 2 IoCs
pid Process 1376 kdloy.exe 812 kdloy.exe -
Loads dropped DLL 2 IoCs
pid Process 848 8f06fc88d506abe6358290718e936022eb7008512bc7f5c29beaec610af84b81.exe 848 8f06fc88d506abe6358290718e936022eb7008512bc7f5c29beaec610af84b81.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ kdloy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kdloy = "C:\\Users\\Admin\\kdloy.exe /b" kdloy.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 8f06fc88d506abe6358290718e936022eb7008512bc7f5c29beaec610af84b81.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kdloy = "C:\\Users\\Admin\\kdloy.exe /k" kdloy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kdloy = "C:\\Users\\Admin\\kdloy.exe /g" kdloy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kdloy = "C:\\Users\\Admin\\kdloy.exe /v" kdloy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kdloy = "C:\\Users\\Admin\\kdloy.exe /n" kdloy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kdloy = "C:\\Users\\Admin\\kdloy.exe /a" kdloy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kdloy = "C:\\Users\\Admin\\kdloy.exe /h" kdloy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kdloy = "C:\\Users\\Admin\\kdloy.exe /l" kdloy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kdloy = "C:\\Users\\Admin\\kdloy.exe /o" kdloy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kdloy = "C:\\Users\\Admin\\kdloy.exe /q" kdloy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kdloy = "C:\\Users\\Admin\\kdloy.exe /m" kdloy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kdloy = "C:\\Users\\Admin\\kdloy.exe /j" kdloy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kdloy = "C:\\Users\\Admin\\kdloy.exe /x" kdloy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kdloy = "C:\\Users\\Admin\\kdloy.exe /z" kdloy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kdloy = "C:\\Users\\Admin\\kdloy.exe /t" kdloy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kdloy = "C:\\Users\\Admin\\kdloy.exe /e" kdloy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kdloy = "C:\\Users\\Admin\\kdloy.exe /y" kdloy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kdloy = "C:\\Users\\Admin\\kdloy.exe /i" kdloy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kdloy = "C:\\Users\\Admin\\kdloy.exe /w" kdloy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kdloy = "C:\\Users\\Admin\\kdloy.exe /s" kdloy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kdloy = "C:\\Users\\Admin\\kdloy.exe /p" 8f06fc88d506abe6358290718e936022eb7008512bc7f5c29beaec610af84b81.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kdloy = "C:\\Users\\Admin\\kdloy.exe /f" kdloy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kdloy = "C:\\Users\\Admin\\kdloy.exe /p" kdloy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kdloy = "C:\\Users\\Admin\\kdloy.exe /r" kdloy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kdloy = "C:\\Users\\Admin\\kdloy.exe /c" kdloy.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 kdloy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 8f06fc88d506abe6358290718e936022eb7008512bc7f5c29beaec610af84b81.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 8f06fc88d506abe6358290718e936022eb7008512bc7f5c29beaec610af84b81.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum kdloy.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Users\Admin\c\autorun.inf kdloy.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1072 set thread context of 848 1072 8f06fc88d506abe6358290718e936022eb7008512bc7f5c29beaec610af84b81.exe 27 PID 1376 set thread context of 812 1376 kdloy.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 848 8f06fc88d506abe6358290718e936022eb7008512bc7f5c29beaec610af84b81.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe 812 kdloy.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1072 8f06fc88d506abe6358290718e936022eb7008512bc7f5c29beaec610af84b81.exe 848 8f06fc88d506abe6358290718e936022eb7008512bc7f5c29beaec610af84b81.exe 1376 kdloy.exe 812 kdloy.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1072 wrote to memory of 848 1072 8f06fc88d506abe6358290718e936022eb7008512bc7f5c29beaec610af84b81.exe 27 PID 1072 wrote to memory of 848 1072 8f06fc88d506abe6358290718e936022eb7008512bc7f5c29beaec610af84b81.exe 27 PID 1072 wrote to memory of 848 1072 8f06fc88d506abe6358290718e936022eb7008512bc7f5c29beaec610af84b81.exe 27 PID 1072 wrote to memory of 848 1072 8f06fc88d506abe6358290718e936022eb7008512bc7f5c29beaec610af84b81.exe 27 PID 1072 wrote to memory of 848 1072 8f06fc88d506abe6358290718e936022eb7008512bc7f5c29beaec610af84b81.exe 27 PID 1072 wrote to memory of 848 1072 8f06fc88d506abe6358290718e936022eb7008512bc7f5c29beaec610af84b81.exe 27 PID 1072 wrote to memory of 848 1072 8f06fc88d506abe6358290718e936022eb7008512bc7f5c29beaec610af84b81.exe 27 PID 1072 wrote to memory of 848 1072 8f06fc88d506abe6358290718e936022eb7008512bc7f5c29beaec610af84b81.exe 27 PID 1072 wrote to memory of 848 1072 8f06fc88d506abe6358290718e936022eb7008512bc7f5c29beaec610af84b81.exe 27 PID 1072 wrote to memory of 848 1072 8f06fc88d506abe6358290718e936022eb7008512bc7f5c29beaec610af84b81.exe 27 PID 848 wrote to memory of 1376 848 8f06fc88d506abe6358290718e936022eb7008512bc7f5c29beaec610af84b81.exe 28 PID 848 wrote to memory of 1376 848 8f06fc88d506abe6358290718e936022eb7008512bc7f5c29beaec610af84b81.exe 28 PID 848 wrote to memory of 1376 848 8f06fc88d506abe6358290718e936022eb7008512bc7f5c29beaec610af84b81.exe 28 PID 848 wrote to memory of 1376 848 8f06fc88d506abe6358290718e936022eb7008512bc7f5c29beaec610af84b81.exe 28 PID 1376 wrote to memory of 812 1376 kdloy.exe 29 PID 1376 wrote to memory of 812 1376 kdloy.exe 29 PID 1376 wrote to memory of 812 1376 kdloy.exe 29 PID 1376 wrote to memory of 812 1376 kdloy.exe 29 PID 1376 wrote to memory of 812 1376 kdloy.exe 29 PID 1376 wrote to memory of 812 1376 kdloy.exe 29 PID 1376 wrote to memory of 812 1376 kdloy.exe 29 PID 1376 wrote to memory of 812 1376 kdloy.exe 29 PID 1376 wrote to memory of 812 1376 kdloy.exe 29 PID 1376 wrote to memory of 812 1376 kdloy.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f06fc88d506abe6358290718e936022eb7008512bc7f5c29beaec610af84b81.exe"C:\Users\Admin\AppData\Local\Temp\8f06fc88d506abe6358290718e936022eb7008512bc7f5c29beaec610af84b81.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\8f06fc88d506abe6358290718e936022eb7008512bc7f5c29beaec610af84b81.exe742⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\kdloy.exe"C:\Users\Admin\kdloy.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\kdloy.exe744⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- Drops autorun.inf file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:812
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126KB
MD54cb177a9fdcd6d8a46acae4e1f92f306
SHA15472383022dd0c250fb7f5457aa9a059695d27e7
SHA2568f06fc88d506abe6358290718e936022eb7008512bc7f5c29beaec610af84b81
SHA51214378e659a979f39dfb2e08f2bef53e334aa283cf103023757ff211f36cf4d62df9af1329214a7d5b97831310fe4bf5f708ef9e6656cc3052601dacd24f325f5
-
Filesize
126KB
MD54cb177a9fdcd6d8a46acae4e1f92f306
SHA15472383022dd0c250fb7f5457aa9a059695d27e7
SHA2568f06fc88d506abe6358290718e936022eb7008512bc7f5c29beaec610af84b81
SHA51214378e659a979f39dfb2e08f2bef53e334aa283cf103023757ff211f36cf4d62df9af1329214a7d5b97831310fe4bf5f708ef9e6656cc3052601dacd24f325f5
-
Filesize
126KB
MD54cb177a9fdcd6d8a46acae4e1f92f306
SHA15472383022dd0c250fb7f5457aa9a059695d27e7
SHA2568f06fc88d506abe6358290718e936022eb7008512bc7f5c29beaec610af84b81
SHA51214378e659a979f39dfb2e08f2bef53e334aa283cf103023757ff211f36cf4d62df9af1329214a7d5b97831310fe4bf5f708ef9e6656cc3052601dacd24f325f5
-
Filesize
126KB
MD54cb177a9fdcd6d8a46acae4e1f92f306
SHA15472383022dd0c250fb7f5457aa9a059695d27e7
SHA2568f06fc88d506abe6358290718e936022eb7008512bc7f5c29beaec610af84b81
SHA51214378e659a979f39dfb2e08f2bef53e334aa283cf103023757ff211f36cf4d62df9af1329214a7d5b97831310fe4bf5f708ef9e6656cc3052601dacd24f325f5
-
Filesize
126KB
MD54cb177a9fdcd6d8a46acae4e1f92f306
SHA15472383022dd0c250fb7f5457aa9a059695d27e7
SHA2568f06fc88d506abe6358290718e936022eb7008512bc7f5c29beaec610af84b81
SHA51214378e659a979f39dfb2e08f2bef53e334aa283cf103023757ff211f36cf4d62df9af1329214a7d5b97831310fe4bf5f708ef9e6656cc3052601dacd24f325f5